Module 5 - Network Layer 2
Module 5 - Network Layer 2
Solution
There is an error in this packet. The 4 leftmost bits (0100)
show the version, which is correct. The next 4 bits (0010)
show an invalid header length (2 × 4 = 8). The minimum
number of bytes in the header must be 20. The packet has
been corrupted in transmission.
Solution
The HLEN value is 5, which means the total number of
bytes in the header is 5 × 4, or 20 bytes (no options). The
total length is 40 bytes, which means the packet is
carrying 20 bytes of data (40 − 20).
Solution
To find the time-to-live field, we skip 8 bytes. The time-to-
live field is the ninth byte, which is 01. This means the
packet can travel only one hop. The protocol field is the
next byte (02), which means that the upper-layer protocol
is IGMP.
Maulika Patel SECE3011-
Computer Networks B.Tech-Sem5
Fragmentation
• Maximum Transfer Unit (MTU)
• When a datagram is encapsulated in a frame, the total size
of the datagram must be less than this maximum size, which
is defined by the restrictions imposed by the hardware and
software used in the network
Solution
If the M bit is 0, it means that there are no more
fragments; the fragment is the last one. However, we
cannot say if the original packet was fragmented or not. A
non-fragmented packet is considered the last fragment.
Solution
If the M bit is 1, it means that there is at least one more
fragment. This fragment can be the first one or a middle
one, but not the last one. We don’t know if it is the first
one or a middle one; we need more information (the
value of the fragmentation offset).
Solution
Because the M bit is 1, it is either the first fragment or a
middle one. Because the offset value is 0, it is the first
fragment.
Solution
To find the number of the first byte, we multiply the offset
value by 8. This means that the first byte number is 800.
We cannot determine the number of the last byte unless
we know the length.
Maulika SECE3011-
Computer
Patel Networks B.Tech-Sem5
Closed-Loop Congestion Control
2. Choke Packet
• A choke packet is a packet sent by a node to the
source to inform it of congestion.
• Note the difference between the backpressure and
choke-packet methods.
• In backpressure, the warning is from one node to its
upstream node, although the warning may
eventually reach the source station.
• In the choke-packet method, the warning is from
the router, which has encountered congestion,
directly to the sou Mritc
ule
Pates
l tation
Computer Networks
SEC.E3011-
B.Tech-Sem5
Choke packet
Maulika SECE3011-
Computer
Patel Networks B.Tech-Sem5
Closed-Loop Congestion Control
3. Implicit Signaling
• In implicit signaling, there is no communication
between the congested node or nodes and the source.
• The source guesses that there is congestion
somewhere in the network from other symptoms.
• For example, when a source sends several packets
and there is no acknowledgment for a while, one
assumption is that the network is congested.
• The delay in receiving an acknowledgment is
interpreted as congestion in the network; the source
should slow downMaulika SECE3011-
Patel Computer Networks B.Tech-Sem5
Closed-Loop Congestion Control
4. Explicit Signaling
• The node that experiences congestion can explicitly
send a signal to the source or destination.
• The explicit-signaling method, however, is different
from the choke-packet method.
• In the choke-packet method, a separate packet is
used for this purpose; in the explicit-signaling
method, the signal is included in the packets that
carry data.
• Explicit signaling can occur in either the forward or
the backward dire Mc
itt
ul iPo
aten
l
Computer Networks
SECE3011-
B.Tech-Sem5
IPv6 ADDRESSES