SlideShare ist ein Scribd-Unternehmen logo
1 von 56
Network layer functions ,[object Object],[object Object],[object Object],[object Object],[object Object]
Current Internet Protocol ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Longevity of TCP/IP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Problems with IPv4 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Problems with IPv4 ,[object Object],[object Object],[object Object],[object Object]
IP Datagram Header VERS HLEN TOS TOTAL LENGTH IDENTIFICATION FLAG FRAGMENT OFFSET TTL PROTOCOL CHECKSUM SOURCE ADDRESS DESTINATION ADDRESS OPTIONS (if any) + PADDING 0 4 8 16 19 31
IP datagram format ,[object Object],[object Object],[object Object],[object Object],ver length 32 bits data  (variable length, typically a TCP  or UDP segment) 16-bit identifier header checksum time to live 32 bit source IP address IP protocol version number header length (bytes) max number remaining hops (decremented at  each router) for fragmentation/ reassembly total datagram length (bytes) upper layer protocol to deliver payload to head. len type of service “ type” of data  flgs fragment offset upper layer 32 bit destination IP address Options (if any) E.g. timestamp, record route taken, specify list of routers  to visit.
IP Fragmentation & Reassembly ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],fragmentation:  in:  one large datagram out:  3 smaller datagrams reassembly
IP Fragmentation and Reassembly ,[object Object],[object Object],[object Object],1480 bytes in  data field offset = 1480/8  ID =x offset =0 fragflag =0 length =4000 ID =x offset =0 fragflag =1 length =1500 ID =x offset =185 fragflag =1 length =1500 ID =x offset =370 fragflag =0 length =1040 One large datagram becomes several smaller datagrams
Problems with IPv4: Limited Address Space ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Problems with IPv4: Routing Table Explosion ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IP Datagram Header VERS HLEN TOS TOTAL LENGTH IDENTIFICATION FLAG FRAGMENT OFFSET TTL PROTOCOL CHECKSUM SOURCE ADDRESS DESTINATION ADDRESS OPTIONS (if any) + PADDING 0 4 8 16 19 31
Problems with IPv4: Header Limitations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Problems with IPv4: Other Limitations ,[object Object],[object Object],[object Object],[object Object],[object Object]
Problems with IPv4: Inadequate support to newer applications ,[object Object],[object Object],[object Object],[object Object],[object Object]
Extended Life for IPv4 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Next generation IP:IPng Security Issues
IPv6: Distinctive Features ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IPng Criteria ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IPng Criteria ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IPv6 road map Feb 1992  Dec 1992  March 1993  May 1993  Nov 1993 Simple CLNP  TUBA Nimrod CNAT IP encaps  IPAE  SIP  SIPP SIP   PIP    TP/IX CATNIP
IPv6 RFCs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IPv6 RFCs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IPv4 header to IPv6 header Source address Destination Address Payload Length Next Header Ver Hop Limit Traffic class Flow Label
IPv6 Header Fields ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IPv6 Header Fields ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Header Changes from IPv4 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Extension Headers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Extension Headers
IPv6 Core Protocols:  IPv6 Extension Headers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],TCP Header  + Data Payload IPv6 Header Next Header = Routing Fragment Header Next Header = Security (ESP) Security Header (ESP) Next Header = TCP  Routing Header Next Header = Fragment
Address Types ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Text Representation of Addresses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Unicast IPv6 addresses:  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Global Unicast Addresses
Link-Local Addresses FE80::/64
Site-Local Addresses FEC0::/10
Special addresses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Compatible addresses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Interface ID
MAC address format
Mapping IEEE 802 Addresses to EUI-64 Addresses
Anycast address overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Anycast address & use ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Anycast address restrictions ,[object Object],[object Object],[object Object]
Multicasting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IPv4 multicast address Class D ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1 1 1 0 28 bit multicast gp ID
Special multicast addresses ,[object Object],[object Object],[object Object],[object Object],[object Object]
Ethernet Multicast address ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mapping of class D IP address into Ethernet Multicast Address ,[object Object],[object Object],[object Object],[object Object],IEEE 802 address
IPv6 Multicast address ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Multicast address structure
IPv6 Multicast address ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mapping IPv6 Multicast Addresses to Ethernet Addresses When sending IPv6 multicast packets on an Ethernet link, the corresponding destination MAC address is 33-33-mm-mm-mm-mm where mm-mm-mm-mm is a direct mapping of the last 32 bits of the IPv6 multicast address, as shown in Figure above
Solicited node multicast address ,[object Object],[object Object],[object Object],[object Object]
An IPv6 Node’s multi cast addresses ,[object Object],[object Object],[object Object]
THANK YOU For your patient hearing

Weitere ähnliche Inhalte

Was ist angesagt?

INTERNET PROTOCOL VERSION 6
INTERNET PROTOCOL VERSION 6INTERNET PROTOCOL VERSION 6
INTERNET PROTOCOL VERSION 6Chaitanya Ram
 
Internet Protocol Version 6
Internet Protocol Version 6Internet Protocol Version 6
Internet Protocol Version 6sandeepjain
 
Internet Protocol version 6
Internet Protocol version 6Internet Protocol version 6
Internet Protocol version 6Rekha Yadav
 
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...IOSR Journals
 
IPV6 Introduction
IPV6 Introduction IPV6 Introduction
IPV6 Introduction Heba_a
 
Why we need ipv6...
Why we need ipv6...Why we need ipv6...
Why we need ipv6...Adii Shah
 
Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002suvobgd
 
I pv6(internet protocol version 6)
I pv6(internet protocol version 6)I pv6(internet protocol version 6)
I pv6(internet protocol version 6)Subrata Kumer Paul
 
Comparative study of IPv4 and IPv6 on Windows and Linux.
Comparative study of IPv4 and IPv6 on Windows and Linux. Comparative study of IPv4 and IPv6 on Windows and Linux.
Comparative study of IPv4 and IPv6 on Windows and Linux. Shourya Puri
 
10 coms 525 tcpip - internet protocol - ip
10   coms 525 tcpip -  internet protocol - ip10   coms 525 tcpip -  internet protocol - ip
10 coms 525 tcpip - internet protocol - ipPalanivel Kuppusamy
 
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & AnomaliesREMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & AnomaliesRhydham Joshi
 
Compatibility between IPv4 and IPv6
Compatibility between IPv4 and IPv6Compatibility between IPv4 and IPv6
Compatibility between IPv4 and IPv6Zalak Patel
 

Was ist angesagt? (20)

INTERNET PROTOCOL VERSION 6
INTERNET PROTOCOL VERSION 6INTERNET PROTOCOL VERSION 6
INTERNET PROTOCOL VERSION 6
 
Ipv4
Ipv4Ipv4
Ipv4
 
Internet Protocol Version 6
Internet Protocol Version 6Internet Protocol Version 6
Internet Protocol Version 6
 
Internet Protocol Version 4
Internet Protocol Version 4Internet Protocol Version 4
Internet Protocol Version 4
 
Internet Protocol version 6
Internet Protocol version 6Internet Protocol version 6
Internet Protocol version 6
 
i pv6
i pv6i pv6
i pv6
 
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...
 
IPV6 Introduction
IPV6 Introduction IPV6 Introduction
IPV6 Introduction
 
Why we need ipv6...
Why we need ipv6...Why we need ipv6...
Why we need ipv6...
 
Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002
 
I pv6(internet protocol version 6)
I pv6(internet protocol version 6)I pv6(internet protocol version 6)
I pv6(internet protocol version 6)
 
IPV4 vs IPV6
IPV4 vs IPV6IPV4 vs IPV6
IPV4 vs IPV6
 
IPv4 and IPv6
IPv4 and IPv6IPv4 and IPv6
IPv4 and IPv6
 
IPv6_Quick_Start_Guide
IPv6_Quick_Start_GuideIPv6_Quick_Start_Guide
IPv6_Quick_Start_Guide
 
ipv6 ppt
ipv6 pptipv6 ppt
ipv6 ppt
 
Comparative study of IPv4 and IPv6 on Windows and Linux.
Comparative study of IPv4 and IPv6 on Windows and Linux. Comparative study of IPv4 and IPv6 on Windows and Linux.
Comparative study of IPv4 and IPv6 on Windows and Linux.
 
10 coms 525 tcpip - internet protocol - ip
10   coms 525 tcpip -  internet protocol - ip10   coms 525 tcpip -  internet protocol - ip
10 coms 525 tcpip - internet protocol - ip
 
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & AnomaliesREMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
 
Ip4 vs ip6
Ip4 vs ip6Ip4 vs ip6
Ip4 vs ip6
 
Compatibility between IPv4 and IPv6
Compatibility between IPv4 and IPv6Compatibility between IPv4 and IPv6
Compatibility between IPv4 and IPv6
 

Andere mochten auch

Ipv6 1-091110143246-phpapp01
Ipv6 1-091110143246-phpapp01Ipv6 1-091110143246-phpapp01
Ipv6 1-091110143246-phpapp01Rimba Ari
 
Jaimin chp-5 - network layer- 2011 batch
Jaimin   chp-5 - network layer- 2011 batchJaimin   chp-5 - network layer- 2011 batch
Jaimin chp-5 - network layer- 2011 batchJaimin Jani
 
OSI Model (Data Communication) DC3
OSI Model (Data Communication) DC3OSI Model (Data Communication) DC3
OSI Model (Data Communication) DC3koolkampus
 
Datacom module 5 (UART, USRT, Serial Interface, Modem)
Datacom module 5 (UART, USRT, Serial Interface, Modem)Datacom module 5 (UART, USRT, Serial Interface, Modem)
Datacom module 5 (UART, USRT, Serial Interface, Modem)Jeffrey Des Binwag
 
Introduction to ipv6 v1.3
Introduction to ipv6 v1.3Introduction to ipv6 v1.3
Introduction to ipv6 v1.3Karunakant Rai
 
ipv6 introduction & environment buildup
ipv6 introduction & environment buildupipv6 introduction & environment buildup
ipv6 introduction & environment builduppsychesnet Hsieh
 
Digital data transmission
Digital data transmissionDigital data transmission
Digital data transmissionBZU lahore
 
Transmission of Digital Data(Data Communication) DC11
Transmission of Digital Data(Data Communication) DC11Transmission of Digital Data(Data Communication) DC11
Transmission of Digital Data(Data Communication) DC11koolkampus
 
Internet Access via Cable TV Network
Internet Access via Cable TV NetworkInternet Access via Cable TV Network
Internet Access via Cable TV NetworkSandesh Naik
 

Andere mochten auch (20)

Ipv6 1-091110143246-phpapp01
Ipv6 1-091110143246-phpapp01Ipv6 1-091110143246-phpapp01
Ipv6 1-091110143246-phpapp01
 
Ch31
Ch31Ch31
Ch31
 
IPv6
IPv6IPv6
IPv6
 
Interfaz dte dce
Interfaz dte dceInterfaz dte dce
Interfaz dte dce
 
Dynamics
DynamicsDynamics
Dynamics
 
Sistema de Señalización de Canal Común SS7
Sistema de Señalización de Canal Común SS7Sistema de Señalización de Canal Común SS7
Sistema de Señalización de Canal Común SS7
 
Ch06 1
Ch06 1Ch06 1
Ch06 1
 
Interfaz dte
Interfaz dteInterfaz dte
Interfaz dte
 
Jaimin chp-5 - network layer- 2011 batch
Jaimin   chp-5 - network layer- 2011 batchJaimin   chp-5 - network layer- 2011 batch
Jaimin chp-5 - network layer- 2011 batch
 
Modosdetransmisin
ModosdetransmisinModosdetransmisin
Modosdetransmisin
 
IPv6 Overview
IPv6 OverviewIPv6 Overview
IPv6 Overview
 
OSI Model (Data Communication) DC3
OSI Model (Data Communication) DC3OSI Model (Data Communication) DC3
OSI Model (Data Communication) DC3
 
Datacom module 5 (UART, USRT, Serial Interface, Modem)
Datacom module 5 (UART, USRT, Serial Interface, Modem)Datacom module 5 (UART, USRT, Serial Interface, Modem)
Datacom module 5 (UART, USRT, Serial Interface, Modem)
 
Introduction to ipv6 v1.3
Introduction to ipv6 v1.3Introduction to ipv6 v1.3
Introduction to ipv6 v1.3
 
ipv6 introduction & environment buildup
ipv6 introduction & environment buildupipv6 introduction & environment buildup
ipv6 introduction & environment buildup
 
X.25 protocol
X.25 protocolX.25 protocol
X.25 protocol
 
Digital data transmission
Digital data transmissionDigital data transmission
Digital data transmission
 
Line coding
Line codingLine coding
Line coding
 
Transmission of Digital Data(Data Communication) DC11
Transmission of Digital Data(Data Communication) DC11Transmission of Digital Data(Data Communication) DC11
Transmission of Digital Data(Data Communication) DC11
 
Internet Access via Cable TV Network
Internet Access via Cable TV NetworkInternet Access via Cable TV Network
Internet Access via Cable TV Network
 

Ähnlich wie Network Layer And I Pv6

Ähnlich wie Network Layer And I Pv6 (20)

IPv6 - The Next next generation protocol
IPv6 - The Next next generation protocolIPv6 - The Next next generation protocol
IPv6 - The Next next generation protocol
 
IPv4.pdf
IPv4.pdfIPv4.pdf
IPv4.pdf
 
Networking presentation 9 march 2009
Networking presentation   9 march 2009Networking presentation   9 march 2009
Networking presentation 9 march 2009
 
Network.pptx
Network.pptxNetwork.pptx
Network.pptx
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
 
I pv6 mechanism
I pv6 mechanismI pv6 mechanism
I pv6 mechanism
 
Curs_IPv6.ppt
Curs_IPv6.pptCurs_IPv6.ppt
Curs_IPv6.ppt
 
Ipv6up
Ipv6upIpv6up
Ipv6up
 
Ipv6
Ipv6Ipv6
Ipv6
 
Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
 
Network Layer & Transport Layer
Network Layer & Transport LayerNetwork Layer & Transport Layer
Network Layer & Transport Layer
 
Ipv6_final
Ipv6_finalIpv6_final
Ipv6_final
 
IP Address
IP AddressIP Address
IP Address
 
Data Communication IPv6, Ethernet, OSI Model, Transmission Impairments
Data Communication IPv6, Ethernet, OSI Model, Transmission ImpairmentsData Communication IPv6, Ethernet, OSI Model, Transmission Impairments
Data Communication IPv6, Ethernet, OSI Model, Transmission Impairments
 
I pv4 and ipv6
I pv4 and ipv6I pv4 and ipv6
I pv4 and ipv6
 
Introduction to IP
Introduction to IPIntroduction to IP
Introduction to IP
 
IPv6 .pdf
IPv6 .pdfIPv6 .pdf
IPv6 .pdf
 
Complete notes of computer networks. Bca or bsc students
Complete notes of computer networks. Bca or bsc studentsComplete notes of computer networks. Bca or bsc students
Complete notes of computer networks. Bca or bsc students
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 
Ipv4 & ipv6
Ipv4 & ipv6Ipv4 & ipv6
Ipv4 & ipv6
 

Mehr von Ram Dutt Shukla (20)

Ip Sec Rev1
Ip Sec Rev1Ip Sec Rev1
Ip Sec Rev1
 
Message Authentication
Message AuthenticationMessage Authentication
Message Authentication
 
Shttp
ShttpShttp
Shttp
 
Web Security
Web SecurityWeb Security
Web Security
 
I Pv6 Addressing
I Pv6 AddressingI Pv6 Addressing
I Pv6 Addressing
 
Anycast & Multicast
Anycast & MulticastAnycast & Multicast
Anycast & Multicast
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
 
Retransmission Tcp
Retransmission TcpRetransmission Tcp
Retransmission Tcp
 
Tcp Congestion Avoidance
Tcp Congestion AvoidanceTcp Congestion Avoidance
Tcp Congestion Avoidance
 
Tcp Immediate Data Transfer
Tcp Immediate Data TransferTcp Immediate Data Transfer
Tcp Immediate Data Transfer
 
Tcp Reliability Flow Control
Tcp Reliability Flow ControlTcp Reliability Flow Control
Tcp Reliability Flow Control
 
Tcp Udp Notes
Tcp Udp NotesTcp Udp Notes
Tcp Udp Notes
 
Transport Layer [Autosaved]
Transport Layer [Autosaved]Transport Layer [Autosaved]
Transport Layer [Autosaved]
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
 
T Tcp
T TcpT Tcp
T Tcp
 
Anycast & Multicast
Anycast & MulticastAnycast & Multicast
Anycast & Multicast
 
Igmp
IgmpIgmp
Igmp
 
Mobile I Pv6
Mobile I Pv6Mobile I Pv6
Mobile I Pv6
 
Mld
MldMld
Mld
 

Kürzlich hochgeladen

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Kürzlich hochgeladen (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Network Layer And I Pv6

Hinweis der Redaktion

  1. Why a Layered Network model? (A conceptual model) Reduce complecity (one big problem to seven smaller ones) Standardizes interfaces Facilitates modular engineering Assures interoperable technology Accelerates evolution Simplifies teaching and learning Open architecture Implementations can very from one system to another. For interoperability one has to adhere to MUST criteria.
  2. Version – Indicates the version of IP and is set to 4. The size of this field is 4 bits. Internet Header Length – Indicates the number of 4-byte blocks in the IPv4 header. The size of this field is 4 bits. Because an IPv4 header is a minimum of 20 bytes in size, the smallest value of the Internet Header Length (IHL) field is 5. IPv4 options can extend the minimum IPv4 header size in increments of 4 bytes. If an IPv4 option does not use all 4 bytes of the IPv4 option field, the remaining bytes are padded with 0’s, making the entire IPv4 header an integral number of 32-bits (4 bytes). With a maximum value of 0xF, the maximum size of the IPv4 header including options is 60 bytes (15´4). Type of Service – Indicates the desired service expected by this packet for delivery through routers across the IPv4 internetwork. The size of this field is 8 bits, which contain bits for precedence, delay, throughput, and reliability characteristics. Total Length – Indicates the total length of the IPv4 packet (IPv4 header + IPv4 payload) and does not include link layer framing. The size of this field is 16 bits, which can indicate an IPv4 packet that is up to 65,535 bytes long. Identification – Identifies this specific IPv4 packet. The size of this field is 16 bits. The Identification field is selected by the originating source of the IPv4 packet. If the IPv4 packet is fragmented, all of the fragments retain the Identification field value so that the destination node can group the fragments for reassembly. Flags – Identifies flags for the fragmentation process. The size of this field is 3 bits, however, only 2 bits are defined for current use. There are two flags—one to indicate whether the IPv4 packet might be fragmented and another to indicate whether more fragments follow the current fragment. Fragment Offset – Indicates the position of the fragment relative to the original IPv4 payload. The size of this field is 13 bits. Time to Live – Indicate the maximum number of links on which an IPv4 packet can travel before being discarded. The size of this field is 8 bits. The Time-to-Live field (TTL) was originally used as a time count with which an IPv4 router determined the length of time required (in seconds) to forward the IPv4 packet, decrementing the TTL accordingly. Modern routers almost always forward an IPv4 packet in less than a second and are required by RFC 791 to decrement the TTL by at least one. Therefore, the TTL becomes a maximum link count with the value set by the sending node. When the TTL equals 0,an ICMP Time Expired message is sent to the source IPv4 address and the packet is discarded. Protocol – Identifies the upper layer protocol. The size of this field is 8 bits. For example, TCP uses a Protocol of 6, UDP uses a Protocol of 17, and ICMP uses a Protocol of 1. The Protocol field is used to demultiplex an IPv4 packet to the upper layer protocol. Header Checksum – Provides a checksum on the IPv4 header only. The size of this field is 16 bits. The IPv4 payload is not included in the checksum calculation as the IPv4 payload and usually contains its own checksum. Each IPv4 node that receives IPv4 packets verifies the IPv4 header checksum and silently discards the IPv4 packet if checksum verification fails. When a router forwards an IPv4 packet, it must decrement the TTL. Therefore, the Header Checksum is recomputed at each hop between source and destination. Source Address – Stores the IPv4 address of the originating host. The size of this field is 32 bits. Destination Address – Stores the IPv4 address of the destination host. The size of this field is 32 bits. Options – Stores one or more IPv4 options. The size of this field is a multiple of 32 bits. If the IPv4 option or options do not use all 32 bits, padding options must be added so that the IPv4 header is an integral number of 4-byte blocks that can be indicated by the Internet Header Length field.
  3. Table 30-1 Reference Information About the Five IP Address Classes IP Address Class Format Purpose High-Order Bit(s) Address Range No. Bits Network/Host Max. Hosts A N.H.H.H Few large organizations 1.0.0.0 to 126.0.0.0 7/24 16,777, 214 (2 24 - 2) B N.N.H.H Medium-size organizations 0 128.1.0.0 to 191.254.0.0 14/16 65, 543 (2 16 - 2) C N.N.N.H Relatively small organizations 0 192.0.1.0 to 223.255.254.0 22/8 254 (2 8 - 2) D N/A Multicast groups (RFC 1112) 0 224.0.0.0 to 239.255.255.255 N/A (not for commercial use) N/A E N/A Experimental 240.0.0.0 to  254.255.255.255 N/A N/A Efficiency Ratio because of wastage of bits The basic result from this is that the current Internet using 32-bit Internet addresses are estimated to have a practical maximum of less than 250 million nodes in the IPv4 Internet!
  4. Version – Indicates the version of IP and is set to 4. The size of this field is 4 bits. Internet Header Length – Indicates the number of 4-byte blocks in the IPv4 header. The size of this field is 4 bits. Because an IPv4 header is a minimum of 20 bytes in size, the smallest value of the Internet Header Length (IHL) field is 5. IPv4 options can extend the minimum IPv4 header size in increments of 4 bytes. If an IPv4 option does not use all 4 bytes of the IPv4 option field, the remaining bytes are padded with 0’s, making the entire IPv4 header an integral number of 32-bits (4 bytes). With a maximum value of 0xF, the maximum size of the IPv4 header including options is 60 bytes (15´4). Type of Service – Indicates the desired service expected by this packet for delivery through routers across the IPv4 internetwork. The size of this field is 8 bits, which contain bits for precedence, delay, throughput, and reliability characteristics. Total Length – Indicates the total length of the IPv4 packet (IPv4 header + IPv4 payload) and does not include link layer framing. The size of this field is 16 bits, which can indicate an IPv4 packet that is up to 65,535 bytes long. Identification – Identifies this specific IPv4 packet. The size of this field is 16 bits. The Identification field is selected by the originating source of the IPv4 packet. If the IPv4 packet is fragmented, all of the fragments retain the Identification field value so that the destination node can group the fragments for reassembly. Flags – Identifies flags for the fragmentation process. The size of this field is 3 bits, however, only 2 bits are defined for current use. There are two flags—one to indicate whether the IPv4 packet might be fragmented and another to indicate whether more fragments follow the current fragment. Fragment Offset – Indicates the position of the fragment relative to the original IPv4 payload. The size of this field is 13 bits. Time to Live – Indicate the maximum number of links on which an IPv4 packet can travel before being discarded. The size of this field is 8 bits. The Time-to-Live field (TTL) was originally used as a time count with which an IPv4 router determined the length of time required (in seconds) to forward the IPv4 packet, decrementing the TTL accordingly. Modern routers almost always forward an IPv4 packet in less than a second and are required by RFC 791 to decrement the TTL by at least one. Therefore, the TTL becomes a maximum link count with the value set by the sending node. When the TTL equals 0,an ICMP Time Expired message is sent to the source IPv4 address and the packet is discarded. Protocol – Identifies the upper layer protocol. The size of this field is 8 bits. For example, TCP uses a Protocol of 6, UDP uses a Protocol of 17, and ICMP uses a Protocol of 1. The Protocol field is used to demultiplex an IPv4 packet to the upper layer protocol. Header Checksum – Provides a checksum on the IPv4 header only. The size of this field is 16 bits. The IPv4 payload is not included in the checksum calculation as the IPv4 payload and usually contains its own checksum. Each IPv4 node that receives IPv4 packets verifies the IPv4 header checksum and silently discards the IPv4 packet if checksum verification fails. When a router forwards an IPv4 packet, it must decrement the TTL. Therefore, the Header Checksum is recomputed at each hop between source and destination. Source Address – Stores the IPv4 address of the originating host. The size of this field is 32 bits. Destination Address – Stores the IPv4 address of the destination host. The size of this field is 32 bits. Options – Stores one or more IPv4 options. The size of this field is a multiple of 32 bits. If the IPv4 option or options do not use all 32 bits, padding options must be added so that the IPv4 header is an integral number of 4-byte blocks that can be indicated by the Internet Header Length field.
  5. The exhaustion of the class B network number could be counterweighted by allocating a number of class C networks instead. The drawback was that allocating more than one network number to an organization necessitated more than one entry in the routing tables to advertise connectivity. This allocation policy gave cause to extreme growth in the forwarding tables of central routers, a growth that was so immense that it was termed the routing table explosion. In fact it was growing at a rate about 1.5 times as fast as memory technology at the time [RFC-1752] ! The answer to the problem was a migration from classfull (A/B/C) routing to Classless Inter-Domain Routing (CIDR). The cornerstone of CIDR is the introduction of supernets. Like the division of a network into subnets with subnet masks, a set of small networks could be combined into one supernet. Consecutive network numbers could be aggregated with a common subnet mask, and advertised as a single classless network address. An example is shown in gure 4.2 where four Class C networks are combined to form a supernet using a subnet mask that says how many networks (two bits equals four networks) and a base network number 192.0.8.0 (a starting point) which identies them as 192.0.8.0, 192.0.9.0, 192.0.10.0 and 192.0.11.0. Classfull routing 255.255.255.0 255.255.255.0 255.255.255.0 255.255.255.0 Inherent subnet mask 192.0.10.0 192.0.11.0 192.0.09.0 Classless routing (CIDR) 192.0.08.0 Base network/prefix 192.0.8.0/22 4 Class C networks Subnet mask (252d=11111100b) Supernet 192.0.08.0 255.255.252.0 Figure 4.2: Route aggregation: four becomes one When describing classless addresses it is enough to specify the base network number and the prex length, since the network mask is required to have consecutive ones in the most signicant places. The single classless network address in the above example which has a prex of 22 can thus be uniquely described as 192.0.8.0/22 or 192.0.8/22. The other part of CIDR was the distributed allocation of address space. The idea was that instead of individual organization requesting addresses from a central authority, the central authority should allocate a block of Class C network numbers to each Internet service provider (ISP). The providers themselves would then allocate network numbers from this range to their customers. In the perfect world all customers of an ISP would have addresses in the providers routing domain - resulting in optimal aggregation and only a single classless network address, the one allocated by the central authority, would be advertised in routers upstream from the ISP. In the real world organizations change network providers or receive service from several ISPs. When changing provider it would be preferable, from an Internet point of view, to renumber according to the new providers allocation, which is why address autoconguration is also becoming an important issue here. Organizations connected to more than one ISP, multi-homed organizations, may also limit the effect of proper CIDR aggregation, because routes to the organization might have to be advertised by all connected ISPs. The resulting routing cost depends on the actual conguration, but is no worse than before implementation of CIDR. In fact the routes advertised might be aggregated at a higher level. If the organization is connected to two ISPs in the same country, the routes could possibly be aggregated on a country level. Addresses on the Internet is currently being allocated such that aggregation is maximized and the lifetime of the IPv4 address space is extended. This very cumbersome procedure is in my opinion leading some people to believe that IPv4 addresses are not running out - and they might be right altogether. The cost however is that some applications are not introduced in the current Internet at all because they need more addresses - more than IPv4 can accommodate.
  6. Larger Address Space: IPv6 can ideally offer about 340 trillion, trillion, trillion addresses which can provide over 1027 globally unique addresses to every individual on the earth in the year 2050. With this large address space IPv6 can offer end-to-end (E2E) connectivity to all hosts
  7. Decimal Keyword Version References ------- ------- ------- ---------- 0 Reserved [JBP] 1-3 Unassigned [JBP] 4 IP Internet Protocol [RFC-791,JBP] 5 ST ST Datagram Mode [RFC-1190,JWF] 6 SIP Simple Internet Protocol [RH6] 7 TP/IX TP/IX: The Next Internet [RXU] 8 PIP The P Internet Protocol [PXF] 9 TUBA TUBA [RXC] 10-14 Unassigned [JBP] 15 Reserved [JBP]
  8. The fields in the IPv6 header are: Version – 4 bits are used to indicate the version of IP and is set to 6. Traffic Class – Indicates the class or priority of the IPv6 packet. The size of this field is 8 bits. The Traffic Class field provides similar functionality to the IPv4 Type of Service field. In RFC 2460, the values of the Traffic Class field are not defined. However, an IPv6 implementation is required to provide a means for an application layer protocol to specify the value of the Traffic Class field for experimentation. Flow Label – Indicates that this packet belongs to a specific sequence of packets between a source and destination, requiring special handling by intermediate IPv6 routers. The size of this field is 20 bits. The Flow Label is used for non-default quality of service connections, such as those needed by real-time data (voice and video). For default router handling, the Flow Label is set to 0. There can be multiple flows between a source and destination, as distinguished by separate non-zero Flow Labels. Payload Length – Indicates the length of the IPv6 payload. The size of this field is 16 bits. The Payload Length field includes the extension headers and the upper layer PDU. With 16 bits, an IPv6 payload of up to 65,535 bytes can be indicated. For payload lengths greater than 65,535 bytes, the Payload Length field is set to 0 and the Jumbo Payload option is used in the Hop-by-Hop Options extension header. Next Header – Indicates either the first extension header (if present) or the protocol in the upper layer PDU (such as TCP, UDP, or ICMPv6). The size of this field is 8 bits. When indicating an upper layer protocol above the Internet layer, the same values used in the IPv4 Protocol field are used here. Changes Longer address - 32 bits  128 bits Fragmentation field moved to separate header Header checksum removed Header length removed (fixed length header) Length field excludes IPv6 header Time to live  Hop limit Protocol  Next header 64-bit field alignment TOS replaced by flow label, traffic class
  9. The fields in the IPv6 header are: Version – 4 bits are used to indicate the version of IP and is set to 6. Traffic Class – Indicates the class or priority of the IPv6 packet. The size of this field is 8 bits. The Traffic Class field provides similar functionality to the IPv4 Type of Service field. In RFC 2460, the values of the Traffic Class field are not defined. However, an IPv6 implementation is required to provide a means for an application layer protocol to specify the value of the Traffic Class field for experimentation. Flow Label – Indicates that this packet belongs to a specific sequence of packets between a source and destination, requiring special handling by intermediate IPv6 routers. The size of this field is 20 bits. The Flow Label is used for non-default quality of service connections, such as those needed by real-time data (voice and video). For default router handling, the Flow Label is set to 0. There can be multiple flows between a source and destination, as distinguished by separate non-zero Flow Labels. Payload Length – Indicates the length of the IPv6 payload. The size of this field is 16 bits. The Payload Length field includes the extension headers and the upper layer PDU. With 16 bits, an IPv6 payload of up to 65,535 bytes can be indicated. For payload lengths greater than 65,535 bytes, the Payload Length field is set to 0 and the Jumbo Payload option is used in the Hop-by-Hop Options extension header. Next Header – Indicates either the first extension header (if present) or the protocol in the upper layer PDU (such as TCP, UDP, or ICMPv6). The size of this field is 8 bits. When indicating an upper layer protocol above the Internet layer, the same values used in the IPv4 Protocol field are used here.
  10. Hop Limit – Indicates the maximum number of links over which the IPv6 packet can travel before being discarded. The size of this field is 8 bits. The Hop Limit is similar to the IPv4 TTL field except that there is no historical relation to the amount of time (in seconds) that the packet is queued at the router. When the Hop Limit equals 0, an ICMPv6 Time Exceeded message is sent to the source address and the packet is discarded. Source Address –Stores the IPv6 address of the originating host. The size of this field is 128 bits. Destination Address – Stores the IPv6 address of the current destination host. The size of this field is 128 bits. In most cases the Destination Address is set to the final destination address. However, if a Routing extension header is present, the Destination Address might be set to the next router interface in the source route list.
  11. Here are the extension headers listed in order. Note that the two security headers (AH and ESP) come after Routing and Fragmentation. That is, when we prepare a packet, they are at a higher layer and done first. So, this means the routing headers are processed after IPsec has been applied and what we are securing is a full, unfragmented, end-to-end IPv6 datagram. One can see from the example how the chaining works: first comes the IPv6 header with its next header set to Routing; then comes the Routing Header with its Next Header set to Fragment; then the Fragment Header has its Next Header ESP for security. ESP has Next Header TCP, but this value is actually encrypted “on the wire.” The headers are chained together; most have fixed, known lengths, which are defined in RFCs. The exception is destination options which are encoded as TLVs.