Question

a) Discuss in detail the fields of the IPv4 header that deal with the fragmentation of...

a) Discuss in detail the fields of the IPv4 header that deal with the fragmentation of IPv4 packets. Using these fields show how an IPv4 packet containing 4000 bytes of user data is fragmented to be carried using Ethernet frames.

b) The fragmented IPv4 packet in the Ethernet frames must go over a Token Ring Wide-Area Network where the Maximum Transmission Unit (MTU) is 820 bytes. Show how the IPv4 packet will be re-fragmented to go over the Token Ring Network.

c) In order to reach its final destination, the re-fragmented IPv4 packet, after going over the Token Ring, must now go over a new IEEE 802.11p vehicular network with a Maximum Transmission Unit (MTU) of 1024 bytes. Show how the IPv4 packet will go over this new network to reach its final destination.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

a) The fields of the IPv4 header that deal with the fragmentation of IPv4 packets is highlighted shown below.

IPv4 packet containing 4000 bytes of user data is fragmented to be carried using Ethernet frames.

there are filled like DF , MF ,Fragment offset ,which deals with fragmentation

IPv4 header:

minimum size is 20 Byte and maximun size is 60 Byte. here we have assume min 20 byte of ip header

20 byte of IP header 4000 bytes of user data

since MTU (maximun transmittable unit) of Network 1 (Token Ring WAN) is 820 byte

MTU (maximun transmittable unit) of Network 2 (IEEE 802.11p vehicular )is 1024 byte

when router R1 receive ip v 4 packet containing 4000 byte of user data.it understant that MTU of Network 1 is 820 byte. so Router R1 divide the packet into 5 fragments .each of size 20 byte header + 800 byte data

800 byte of data must be multiple of 8 according to the Ip v 4header.

----------------------------------------------------------------------------------------------------------------------------------------------------------

(b) ip v 4 packet containing 4000 byte of user data is fragmented by Router R1 because MTU of Network 1 is 820 Byte. so Router R1 divide the packet into 5 fragments .each of size 20 byte header + 800 byte data

-------------------------------------------------------------------------------------------------------------------------------------------

IF DF=1 means do not fragment the packet   IF DF=0 means fragmentation is allow   

IF MF=1 means more fragment are coming IF MF=0 means No fragmentation is coming

-----------------------------------------------------------------------------------------------------------------------------------------------

Fragment1: In the first fragment DF=0 and MF=1 fragment offset field  = 0

Fragment2: In the second fragment DF=0 and MF=1 fragment offset field  = 100 (means 100 * 8 = 800 bytes are ahead of this fragment)

Fragment3: In the third fragment DF=0 and MF=1 fragment offset field  = 200 (means 200 * 8 = 1600 bytes are ahead of this fragment)

Fragment4: In the fourth fragment DF=0 and MF=1 fragment offset field  = 300 (means 300 * 8 = 2400 bytes are ahead of this fragment)

Fragment5: In the five fragment DF=0 and MF=0 fragment offset field = 400(means 400 * 8 = 3200 bytes are ahead of this fragment)

----------------in this way 3200 bytes are ahead of this fragment + current fragement 800 byte become ==4000 bytes

20 byte of IP header 800 bytes data

like that 5 fragments

------------------------------------------------------------------------------------------------------------------------------------------

(c) Since MTU of Network 2 is 1024 byte. so the fragments coming from network 1 need not be fragmented as they can easily pass on the second network.

so here in Network 2 when router R2 receive fragment 1 it will pass it directly as fragment size is just 820 byte and capacity of network 2 is more ie 1024 byte.

here all fragment will be pass as packets on second network.

Fragment1: directly pass as  packet with   DF=1 and MF=0 fragment offset field  = 0 // means do not fragment the packet

Fragment2: directly pass as  packet with   DF=1 and MF=0 fragment offset field  = 0

Fragment3: directly pass as  packet with   DF=1 and MF=0 fragment offset field  = 0

Fragment4: directly pass as  packet with DF=1 and MF=0 fragment offset field  = 0

Fragment5:directly pass as  packet with    DF=1 and MF=0   fragment offset field  = 0

this all 05 packet will be reach to deatination.

KQ0-607 1P14 Header Data / PO Byte 4000 Byle El min 20 Byte VER(U) Hlenlu) Servicetype(8) Total lengthakl 6 ) Identificahon NNelwon K2 Network) Token Ring Wan IEEE 802.11 p Vehicular Nelwork MTU-820 Byle MTU = 10 120 4000 201800 user fragment) 201800

Add a comment
Know the answer?
Add Answer to:
a) Discuss in detail the fields of the IPv4 header that deal with the fragmentation of...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  •  To begin, draw the OSI model on the left side of your paper, being certain to...

     To begin, draw the OSI model on the left side of your paper, being certain to label each layer. 2. Above the top layer of the OSI model, write Software. Then, below the bottom layer, write Network. 3. Suppose the software issues a message to the network that is 3400 bytes in size. Next to the Application layer, Presentation layer, and Session layer, draw the PDU for this message as it appears at each of these layers (adding the appropriate...

  • 1. Which 802.11 standard has the best performing parameters in terms of data rate, range, channel...

    1. Which 802.11 standard has the best performing parameters in terms of data rate, range, channel separation issues and interoperability? 802.11n 802.11b 802.11g 802.11a 2. WPA2 uses IEEE 802.X with the Extensible Authentication Protocol (EAP) to perform mutual authentication, either via a _________ server or by means of a changing key generated on the basis of a shared secret pass-phrase. AES RADIUS WEP Common 3. At the MAC level, 802.11 LANs involve the use of ______ for medium access control....

  • MULTIPLE CHOICE WiMAX is based on the ______ standard. A) IEEE 802.11                      B) IEEE 802.11a C)...

    MULTIPLE CHOICE WiMAX is based on the ______ standard. A) IEEE 802.11                      B) IEEE 802.11a C) IEEE 802.13                      D) IEEE 802.16 The key stumbling blocks in installing ______ systems are obtaining permission to use a given frequency band and finding a suitable elevated site for the BS antennas. A) WBA                      B) BWA C) WLL                       D) WCL The set of network functions needed to provide radio access to WiMAX subscribers is: A) CSN                        B) ASN C) NAP                        D) NSP A ________...

  • 1. a. In Wireshark, for packet 92, what information in the IP header indicates that the...

    1. a. In Wireshark, for packet 92, what information in the IP header indicates that the datagram has been fragmented? b. What information in the IP header indicates whether this is the first fragment versus a latter fragment? How long is this IP datagram? 2. a. For packet 93, what information in the IP header indicates that this is not the first data fragment? Are there more fragments? If so, how can you tell? - 0 X IP_traceFile File Edit...

  • check my answers for Networking I came up with these answers, can check my answers Question...

    check my answers for Networking I came up with these answers, can check my answers Question 1: General What data rate is needed to transmit an uncompressed 4" x 6" photograph every second with a resolution of 1200 dots per inch and 24 bits per dot (pixel)? 691,200 kb/s 28.8 kb/s 8.29 Mb/s 829 Mb/s Question 2: Layering "Layering" is commonly used in computer networks because (check all that apply): -It forces all network software to be written in ‘C’....

  • help with computer network questions 1. What is the difference between circuit switching and packet switching?...

    help with computer network questions 1. What is the difference between circuit switching and packet switching? 2. What are the different layers in today’s Internet? Why do we create layers? 3. Suppose there is a 10 Mbps microwave link between a geostationary satellite and its base station on Earth. Every minute the satellite takes a digital photo and sends it to the base station. Assume a propagation speed of 2.4 * 10^8 meters/sec. a. What is the propagation delay of...

  • Chapter 18: wireless networks TRUE OR FALSE                                    

    Chapter 18: wireless networks TRUE OR FALSE                                                                                                     T          F          1. As the demand for broadband Internet access has grown, providers of wired local loop service have responded with increasing reliance   on optical fiber and coaxial cable. T          F          2. A BWA provider services one or more cells. T          F          3. Wireless systems are more expensive than wired systems. T          F          4. IEEE 802.16 and the associated WiMAX specification now deal with      both fixed and mobile BWA. T          F         ...

  • In this lab, we’ll investigate the 802.11 wireless network protocol. Follow the instructions and answers questions...

    In this lab, we’ll investigate the 802.11 wireless network protocol. Follow the instructions and answers questions 7 - 10. http://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip In this lab, we'll investigate the 802.11 wireless network protocol. Before beginning this lab, you might want to re-read Section 6.3 in the text. Since we l1 be delving a bit deeper into 802.11 than is covered in the text, you might want to check out "A Technical Tutorial on the 802.11Protocol," by Pablo Brenner (Breezecom Communications) http://www.sss-mag.com/pdf802_11tut.pdf, and "Understanding...

  • Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic...

    Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic redundancy check (CRC) A. Yes, No, No B. No, Yes, Yes c. No, Yes, No D. No, No, Yes E. Ho, hum, ha Q2 CRC vs Internet checksums Which of these is not true? A. CRC's are commonly used at the link layer B. CRC's can detect any bit error of up to r bits with an r-bit EDC. c. CRC's are more resilient to bursty...

  • Please use own words. Thank you. CASE QUESTIONS AND DISCUSSION > Analyze and discuss the questions...

    Please use own words. Thank you. CASE QUESTIONS AND DISCUSSION > Analyze and discuss the questions listed below in specific detail. A minimum of 4 pages is required; ensure that you answer all questions completely Case Questions Who are the main players (name and position)? What business (es) and industry or industries is the company in? What are the issues and problems facing the company? (Sort them by importance and urgency.) What are the characteristics of the environment in which...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT