Académique Documents
Professionnel Documents
Culture Documents
Next, the Network layer must provideservices todirect these packets to their
destination host. The source and destination hosts are not always connected to the same
network. In fact, the packet might have to travel through many different networks.
Along the way, each packet must be guided through the network to reach its final
destination. Intermediary devices that connect the networks are calledrouters. The
role of the router is toselect paths for and direct packets toward their destination.
. This process is known asrouting
Each route that a packet takes to reach the next device is called ahop
.Finally, the packet arrives at the destination host and is processed at Layer 3
The host examines the destination address to verify that the
. packet was addressed to this device
If the address iscorrect
the packet is decapsulated by the Network layer and the Layer 4 PDU
contained in the packet is passed up to the appropriate service at
.Transport layer
Unlike the Transport layer (OSI Layer 4), whichmanages the data transport between
the processes running on each end host,Network layer protocols specify the
packet structure and processing used to carry the data from one host to another
.host
-:Note
Network layer can be carry packets for multiple types of communications between
.multiple hosts
Protocols implemented at the Network layer include
( Internet Protocol version 4(IPv4
( Internet Protocol version 6(IPv6
( Novell Internetwork Packet Exchange(IPX
AppleTalk
( Connectionless Network Service(CLNS/DECNet
Role of IPv4
Internet Protocol was designed as a protocol withlow overhead. It
provides only the functions that are necessary todeliver a
packet from a source to a destination over an interconnected
system of networks
2. Basic characteristics of the IPv4 protocol
.1 An example ofconnectionless communication issending a letter to
someonewithout notifying the recipient in advance,
as explain in the following figure. Connectionless data
communications works on the same principle. IP packets are sent
without notifying the end host that they are coming
Connection-oriented protocols .2 , such asTCP ,require that control
data be exchanged to establish the connection as well as additional
.fields in the PDU header
Unreliable means simply that, IPdoes not guarantee that all sent packets
.will be received
This means that IP does not have thecapability to manage, and recover
.from, undelivered or corrupt packets
B. There is, however,one major characteristic of the media that the Network
layer considers: themaximum size of PDU that each medium can transport.
This characteristic is referred to as theMaximum Transmission Unit .))MTU
Application Layer
IPv4 protocol defines many different fields(6) in the packet header. As shown in figure
. on page19
IP Source Address *
IP Destination Address *
(Time-to-Live (TTL *
(Type-of-Service (ToS *
Protocol *
Fragment Offset *
IP Source Address .1
The IP Source Address field contains a 32-bit binary value that represents the packet
source Network layer host address
IP Destination Address .2
The IP Destination Address field contains a 32-bit binary value that represents the
packet destination Network layer host address
)Time-to-Live )TTL .3
a. TheTTL is an 8-bit binary value thatindicates the remaining "life" of the packet
b. The TTL value isdecreased by at least one each time the packet is processed by a
router (that is, each hop). When the value becomeszero, the router discards or drops
the packet and it isremoved from the network data flow. This mechanismprevents
packets that cannot reach their destination from being forwarded indefinitely between
. routers in arouting loop
Protocol .4
This 8-bit binary valueindicates the data payload type that the packet is carrying.
The Protocol field enables theNetwork layer to pass the data to the appropriate
upper-layer protocol
Example values are
UPD 17) ,06 (ICMP 01, TCP
)Type-of-Service )TOS.5
The Type-of-Service field contains an 8-bit binary value that is used to determine the
priority of each packet. This value enables a Quality-of-Service (QoS)
mechanism to be applied to high priority packets, such as those carrying telephony
voice data
Fragment Offset.6
The fragment offset fieldidentifies the order in which to place the packet fragment in
the reconstruction
More Fragments flag
The More Fragments (MF) flag is asingle bit in the flag field used with the fragment
.offset for the fragmentation and reconstruction of packets
IF .1)MF=1 and offset =1) Then, this means that it isnot the last fragment of a
packet. This means you must examines the fragment off set to see where this
.fragment is to be placed in the reconstructed packet
.2IF )MF = 0 and offset<>0 )Then, then this means that it is the last fragment of a
.packet, it places that fragment as the last part of the reconstructed packet
.3IF )MF = 0 and offset =0 ) Then, this means that packet isunfragmented
Don't Fragment flag
The Don't Fragment (DF) flag is asingle bit in the Flag field thatindicates that
.fragmentation of the packet is not allowed
If a router needs to fragment a packet to allow it to be passed downward to the Data
Link layer but theDF =1 , then the router willdiscard. this packet
Version (- Contains the IP version number (4 *
Packet Length- This field gives the entire packet size, including header and data, in•
.bytes
Identification- This field is primarily used for uniquely identifying fragments of an•
original IP packet
Header Checksum- The checksum field is used for error checking the packet•
.header
Options- There is provision for additional fields in the IPv4 header to provide other
.services but these are rarely used
List several different reasons for grouping devices into sub-networks and
define several terms used to identify the sub-networks
31
networks grow , they may becometoo large to manage as a As our *
single network . At that point, we need todivide our network. When we plan
the division of the network,we need to group together those hosts with
common factors into the same network
Dividing large networks so that hosts who need to communicate are grouped *
together reduces the unnecessary overhead of all hosts needing to know all addresses
For all other destinations, the hosts only need to know the address of an *
intermediary device, to which they send packets for all other destinations addresses.
This intermediary device is called agateway .The gateway is a router on a network
that serves as an exit from that network
?Common problems with a large network
performance degradation -1
security issues -2
host identification -3
. To beable to divide networks , we needhierarchical addressing
A hierarchical address uniquely identifies each host .It also
has levels that assist in forwarding packets across
internetworks, which enables a network to be divided based on
those levels
Describe the purpose of further subdividing networks into smaller *
networks
network portion of the address for With IPv4 hierarchical addressing, the *
all hosts in a network is the same . Todivide a network , the network
portion of the address is extended to use bits from the host portion of
the address. These borrowed host bits are then used as network bits to
represent the different subnetworks within the range of the original
network
subnet mask In the devices in an IPv4 network, a separate 32-bit number called a *
indicates the prefix
-:Ex 1
? How many number of bits use to represent network portion and host portion
21/ 57 .18 .168 .192
Number of bit used to representnetwork portion=21 bit
Number of bit used to representhost portion=11 bit
-:Ex 2
? How many number of bits use to represent network portion and host portion
128 .255 .255 .255
Number of bit used to representnetwork portion=25 bit
Number of bit used to representhost portion=7 bit
-:Note
255 new hosts Each bit add to host address can be label *
The router may also use adefault route to forward the packet. The default route is
used when the destination network is not represented by any other route in
the routing table
A host creates the routes used to forward the packets it originates. These **
routes are derived fromthe connected network and theconfiguration of
.the default gateway
the routing table of a computer host can be examined at the command line **
by issuing theNetstat -r ,Route , orRoute PRINT . commands
routing table contains theinformation that a router uses in its packet The **
forwarding decisions. For the routing decisions, the routing table needs to
represent the most accurate state of network pathways that the router can access.
Out-of-date routing information means that packets may not be forwarded to the
most appropriate next-hop, causing delays or packet loss
manually configured on the router (static routing) (not Route information can be**
always feasible) or learneddynamically from other routers in the same
.internetwork
.are the set of rules by which routers dynamically share their routing information
:Common routing protocols are
Routing Information Protocol))RIP
Enhanced Interior Gateway Routing Protocol))EIGRP
Open Shortest Path First))OSPF
Trace the steps of several IP packets as they are routed through several **
gateways from devices on one sub network to devices on other sub
networks
.
Explain how routes are manually configured to build routing table*
Explain how routes are dynamic configured to build routing table *
END