Preview

Description of Ipv4 Header Fields

Better Essays
Open Document
Open Document
1582 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Description of Ipv4 Header Fields
For the first section of this Mid Term, I will describe the fields in the IP version 4 (IPv4) packet header. (What is the structure (each field) of an IPv4 packet?). The first field is a 4-bit version field. Next we have a 4-bit Internet Header Length (IHL) that tells the number of 32-bit words in the IPv4 header. The next field is an 8-bit Type of Service (ToS) field. This technology was never fully implemented so new technology has been developed to utilize this portion of the header. It now relays the DiffServ and Explicit Congestion Notification (ECN) to help the reliability of real time data streaming technologies. The Total Length filed is next. This is a 16-bit field that shows the entire datagram size including header and data, in 8-bit bytes. Next we have a 16-bit Identification field. This field is used primarily to uniquely identify fragment of an original IP datagram. A 3-bit field to control or identify fragments is next. This field must either be zero for reserved, don't fragment, and more fragments. The fragment offset field in next and is a 13-bit field used to determine the particular place of a fragment in the original IP datagram. The 8-bit Time to Live (TTL) field follows. This field stops a datagram from going in circles on a network. It used to be measured in seconds, but is now a hop count field. Once the field comes to zero after passing each switch or router, the packet is no longer forwarded. The 8-bit protocol field follows to show the protocol used in the data portion of the datagram. There are predestinated values for different protocols such as ICMP (1), TCP (6), and UDP (17). Next is the 16-bit header Checksum field. Since some values in an IPv4 header may change, the checksum must be adjusted through the network. Following the checksum field there is a 32-bit Source address field directly followed by another 32-bit Destination address field. Finally, before the data, there can also be additional header fields

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT1120 Lab 3

    • 115 Words
    • 1 Page

    2. You can see what kind the time the IP address the destination the protocol and the length of the packet.…

    • 115 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    netw 240 week 7

    • 330 Words
    • 3 Pages

    What Field in the TCP header contains a well known port number that maps to the Application that will handle the segment Data Stream?…

    • 330 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 2469 Words
    • 10 Pages

    In order to do so, the packet analyzer must “understand” the structure of all messages exchanged by protocols. For example, suppose we are interested in displaying the various fields in messages exchanged by the HTTP protocol in Figure 1. The packet analyzer understands the format of Ethernet frames, and so can identify the IP datagram within an Ethernet frame. It also understands the IP datagram format, so that it can extract the TCP segment within the IP datagram. Finally, it understands the TCP segment structure, so it can extract the HTTP message contained in the TCP segment. Finally, it understands the HTTP protocol and so, for example, knows that the first bytes of an HTTP message will contain the string “GET,” “POST,” or “HEAD,” as shown in Figure 2.8 in the…

    • 2469 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    In a computer network internet protocol is used for communication, to each device such as printers and computers a numerical label called an IP (Internet Protocol) Address is assigned. There are two functions of an IP Address a host or network interface identification, and also provides a location addressing. The basic elements of a network are the IP Address and Subnet Mask. There is also switching and routing which after you connect devices to switches and routers, data packets can be moved across the network. The Internet Protocol Version 4 (known as IPv4) is a protocol highly used even today, this IP Address consist of a 32-bit number in decimal or binary in four parts. In 1995 Internet Protocol Version 6 (known as IPv6) was created due to a high growth of the Internet, and the reduction of…

    • 413 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This column shows the protocol that the packet is using. It would be useful when trying to decide if the proper protocol is being used and if it is causing a conflict which could shut the system or program down.…

    • 1389 Words
    • 6 Pages
    Satisfactory Essays
  • Powerful Essays

    TCP / IP Model - provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination. This functionality has been organized into four abstraction layers which are used to sort all related protocols according to the scope of networking involved.[1][2] From lowest to highest, the layers are the link layer, containing communication technologies for a single network segment (link), the internet layer, connecting hosts across independent networks, thus establishing internetworking.…

    • 559 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    nt2640 week1

    • 1824 Words
    • 8 Pages

    5. The process of a web server adding a TCP header to the contents of a web page, followed by adding an IP header and then adding a data link header and trailer, is an example of what?…

    • 1824 Words
    • 8 Pages
    Good Essays
  • Satisfactory Essays

    IT245 PH3 DB1

    • 310 Words
    • 1 Page

    INTERNET TUTORIAL (The TCP/IP and ISO Reference Models). (n.d.). Retrieved December 3, 2014, from http://papa.det.uvigo.es/~theiere/cursos/Curso_Internet/ISO.html…

    • 310 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Lab 12

    • 3059 Words
    • 13 Pages

    In this lab you will use the Wireshark packet analyzer to capture and display the control information and data stored in packets transmitted over a network. Wireshark collects network traffic data and creates files that display packet header information in a layered format like that used by the Internet model. These layers can be expanded to view details that may prove helpful in determining the source of problems that your network might be experiencing. Creating filters that hide unwanted data and facilitate data analysis will also be discussed in this lab.…

    • 3059 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    ____ is an open-source protocol framework for security development within the TCP/IP family of protocol standards.…

    • 1195 Words
    • 17 Pages
    Good Essays
  • Satisfactory Essays

    Chapter 4 Study Guide

    • 2291 Words
    • 10 Pages

    Identifies the segment of data and provides for identification of the Transport Layer Protocol to use…

    • 2291 Words
    • 10 Pages
    Satisfactory Essays
  • Powerful Essays

    Next Header (8 bits) The 8-bit Next Header field classifies the type of header proximately following the IPv6 header and placed at the start of the data field (payload) of the IPv6 packet. This field regularly specifies the transport layer protocol used by a packet's payload. The dual most mutual types of Next Headers are TCP (6) and UDP (17), but abundant other headers are also possible. The format approved for this field is the one anticipated for IPv4 by RFC 1700. In event of IPv6 protocol, the Next Header field is comparable to the IPv4 Protocol…

    • 1621 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    It 240 Appendix F

    • 260 Words
    • 2 Pages

    Transmission Control Protocol / Internet Protocol (TCP/IP) TCP is the protocol used in networking that provides a connection-oriented, reliable way for applications to communicate large amount of data at one time over a network. IP is a connectionless protocol responsible for addressing network devices, and routing packets between…

    • 260 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the event that a packet becomes lost due to network congestion, traffic load balancing, or other unpredictable network behavior, TCP detects these problems, requests retransmission of lost data, rearranges out-of-order data, and even helps minimize network congestion to reduce the occurrence of the other problems. Once the TCP receiver has reassembled the sequence of octets originally transmitted, it passes them to the application program.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    data networking study guide

    • 3819 Words
    • 16 Pages

    o Frames go to switch and switch checks source mac and learns it if it…

    • 3819 Words
    • 16 Pages
    Powerful Essays

Related Topics