SlideShare une entreprise Scribd logo
1  sur  16
Internet Protocol
Internetwork
- Logical network built out of a collection of physical
networks to provide some host to host packet delivery
service.
Router – the node that interconnects the network.
Router is also called as gateway.
Internet Protocol
• Key tool used to build scalable, heterogeneous internetworks.
• Also called as Kahn – Cerf protocol.
Service model,
o Provide host to host services.
o Two parts,
- Addressing Scheme – to identify all the hosts in the internetwork.
- Datagram Model – for data delivery
Internet Protocol
Internet Protocol
 Also called as best effort model.
Best effort model,
 It makes no guarantee for datagram delivery.
 If packets gets lost, corrupted, misdelivered or it fails to reach
intended destination, it does nothing.
 Unreliable service.
Internet Protocol
IPv4 Packet Format
Internet Protocol
• Version (4 bit) – Version - version of the Internet Protocol.
• HLen (4 bit) – Header Length – specifies the length of the header in 32 bit
words. (Normally it contains value 5 i.e., 5 words – 20 Bytes).
• TOS (8 bit) – Type of Service–defines type of service that allows packets to be
treated differently based on the application need. (i.e., priority to packets)
• Length (8 bit) –length of the datagram including the header in bytes.
(Maximum value is 65,525 bytes).
Internet Protocol
• Identifier, flag, offset – used in fragmentation.
• Flag:
- DF- do not fragment bit. If this bit is 1, we cannot fragment that packet.
- M – More fragment bit. This bit is one when more fragments to follow.
• TTL (8 bit) –Time to live–number of seconds that the packet would be
allowed to live (default value is 64)
Reserved DF LF or M
Internet Protocol
• Protocol (8 bit) –demultiplexing key for higher level layer protocols.
• TCP – 6
• UDP – 17
• Checksum (16 bit) – used to detect errors in header.
- Checksum is calculated by considering the entire header as a sequence of 16 bit
words, adding them and taking the ones compliment of the result
• SourceAddr, DestAddr (32 bit each)–IP address of the source and destination
host.
Internet Protocol – Fragmentation and
Reassembly
Fragmentation and Reassembly,
• In a heterogeneous collection of networks, each network has its own
capacity to receive a packet called Maximum Transmission Unit (MTU).
• MTU – largest IP datagram that it can carry in a frame.
• Ethernet can accept up to 1500 bytes long packet. For FDDI, it is 4500
bytes long and for PPP 512 bytes long.
• Fragmentation occurs in a router when it receives a datagram that it wants
to forward over a network which has MTU <IP datagram size
Internet Protocol – Fragmentation and
Reassembly
• Reassembly is done at the receiving host
• All the fragments carry the same identifier in the Ident field
• IP does not recover any missing fragments.
Internet Protocol – Fragmentation and
Reassembly
Two important points,
• Each fragment is itself a self-contained IP datagram that is transmitted over
a sequence of physical networks, independent of other fragments.
• Each IP datagram is re-encapsulated for each physical network over which
it travels.
(a) Unfragmented packet (b) fragmented
packets
Internet Protocol – Fragmentation and
Reassembly
In the above mentioned model, fragmentation is occurred in R2 (router 2).
• When the packet (1400 bytes of data) arrives at R2, which has an MTU of 532
bytes, so it has to be fragmented.
• 532 bytes MTU can hold 512 bytes of data + 20 bytes of IP header.
• IP header fields used in fragmentation,
• Flags,
Reserved DF LF or M
lf (last fragment) or M (More fragment) bit – set when more fragments to follow.
Internet Protocol – Fragmentation and
Reassembly
• Offset – used to identify the starting byte of the fragment.
- In first fragment it sets to 0.
- Offset field counts 8 bytes.
- In our example, offset field in the second fragment is 64 i.e., 512 / 8.
• Ident (Identifier) – used to identify the packet to which the fragments
are belongs to.

Contenu connexe

Tendances

Ipv6 1-091110143246-phpapp01
Ipv6 1-091110143246-phpapp01Ipv6 1-091110143246-phpapp01
Ipv6 1-091110143246-phpapp01
Rimba Ari
 
Ipv4 tutorial
Ipv4 tutorialIpv4 tutorial
Ipv4 tutorial
saryu2011
 
IP Routing
IP RoutingIP Routing
IP Routing
Peter R. Egli
 
Exploration network chapter_5_modified
Exploration network chapter_5_modifiedExploration network chapter_5_modified
Exploration network chapter_5_modified
rajesh531
 

Tendances (20)

IPv6 header
IPv6 headerIPv6 header
IPv6 header
 
Ipv4 ppt
Ipv4 pptIpv4 ppt
Ipv4 ppt
 
internet protocols
internet protocolsinternet protocols
internet protocols
 
10 coms 525 tcpip - internet protocol - ip
10   coms 525 tcpip -  internet protocol - ip10   coms 525 tcpip -  internet protocol - ip
10 coms 525 tcpip - internet protocol - ip
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
 
Internet protocol
Internet protocol Internet protocol
Internet protocol
 
Ipv6 1-091110143246-phpapp01
Ipv6 1-091110143246-phpapp01Ipv6 1-091110143246-phpapp01
Ipv6 1-091110143246-phpapp01
 
Ipv4 tutorial
Ipv4 tutorialIpv4 tutorial
Ipv4 tutorial
 
IP Routing
IP RoutingIP Routing
IP Routing
 
Internet protocol
Internet protocolInternet protocol
Internet protocol
 
The Internet Protocol version 4 (IPv4)
The Internet Protocol version 4 (IPv4)The Internet Protocol version 4 (IPv4)
The Internet Protocol version 4 (IPv4)
 
Exploration network chapter_5_modified
Exploration network chapter_5_modifiedExploration network chapter_5_modified
Exploration network chapter_5_modified
 
Ipv4
Ipv4Ipv4
Ipv4
 
Tcp and introduction to protocol
Tcp and introduction to protocolTcp and introduction to protocol
Tcp and introduction to protocol
 
TCP vs UDP / Sumiet23
TCP vs UDP / Sumiet23TCP vs UDP / Sumiet23
TCP vs UDP / Sumiet23
 
Chapter 4 internetworking [compatibility mode]
Chapter 4   internetworking [compatibility mode]Chapter 4   internetworking [compatibility mode]
Chapter 4 internetworking [compatibility mode]
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALAINTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
 
internet protocol
internet protocolinternet protocol
internet protocol
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
 

En vedette

3d connecting networks
3d connecting networks3d connecting networks
3d connecting networks
kavish dani
 
12 strategey evaluation & control
12 strategey evaluation & control12 strategey evaluation & control
12 strategey evaluation & control
bwire sedrick
 
Lan access control methods
Lan access control methodsLan access control methods
Lan access control methods
bwire sedrick
 
WIDE AREA NETWORK
WIDE AREA NETWORKWIDE AREA NETWORK
WIDE AREA NETWORK
Nur Ana
 
Types of computer network
Types of computer networkTypes of computer network
Types of computer network
Amit Shaw
 

En vedette (20)

Chapter3
Chapter3Chapter3
Chapter3
 
3d connecting networks
3d connecting networks3d connecting networks
3d connecting networks
 
Introduction to Wan Acceleration Devices
Introduction to Wan Acceleration DevicesIntroduction to Wan Acceleration Devices
Introduction to Wan Acceleration Devices
 
Planning for a good presentation
Planning for a good presentationPlanning for a good presentation
Planning for a good presentation
 
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
 
Computer systems
Computer systemsComputer systems
Computer systems
 
Principles of ict concepts and data processing
Principles of ict   concepts and data processingPrinciples of ict   concepts and data processing
Principles of ict concepts and data processing
 
12 strategey evaluation & control
12 strategey evaluation & control12 strategey evaluation & control
12 strategey evaluation & control
 
Lan wan
Lan wanLan wan
Lan wan
 
Lan access control methods
Lan access control methodsLan access control methods
Lan access control methods
 
Network Management Devices
Network Management DevicesNetwork Management Devices
Network Management Devices
 
Adapter Design Pattern
Adapter Design PatternAdapter Design Pattern
Adapter Design Pattern
 
Wireless WANs
Wireless WANsWireless WANs
Wireless WANs
 
WIDE AREA NETWORK
WIDE AREA NETWORKWIDE AREA NETWORK
WIDE AREA NETWORK
 
Types of computer network
Types of computer networkTypes of computer network
Types of computer network
 
Wan technologies
Wan technologiesWan technologies
Wan technologies
 
Wide area network (wan)
Wide area network (wan)Wide area network (wan)
Wide area network (wan)
 
Isdn networking
Isdn networkingIsdn networking
Isdn networking
 
Lan and wan
Lan and wanLan and wan
Lan and wan
 
Networking
NetworkingNetworking
Networking
 

Similaire à Internetworking - IP

Custom_IP_Network_Protocol_and_Router
Custom_IP_Network_Protocol_and_RouterCustom_IP_Network_Protocol_and_Router
Custom_IP_Network_Protocol_and_Router
Vishal Vasudev
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report Slides
Bassam Kanber
 
Computer network (12)
Computer network (12)Computer network (12)
Computer network (12)
NYversity
 
ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.ppt
ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.pptip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.ppt
ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.ppt
VINAYTANWAR18
 

Similaire à Internetworking - IP (20)

Internet Protocol Version 4
Internet Protocol Version 4Internet Protocol Version 4
Internet Protocol Version 4
 
Ip and icmp
Ip and icmpIp and icmp
Ip and icmp
 
Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
 
Ipspk1
Ipspk1Ipspk1
Ipspk1
 
Custom_IP_Network_Protocol_and_Router
Custom_IP_Network_Protocol_and_RouterCustom_IP_Network_Protocol_and_Router
Custom_IP_Network_Protocol_and_Router
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report Slides
 
TCP/IP Protocol Architeture
TCP/IP Protocol ArchitetureTCP/IP Protocol Architeture
TCP/IP Protocol Architeture
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1
 
Networking essentials lect2
Networking essentials lect2Networking essentials lect2
Networking essentials lect2
 
Basic networking
Basic networkingBasic networking
Basic networking
 
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENTTCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
Network Layer & Transport Layer
Network Layer & Transport LayerNetwork Layer & Transport Layer
Network Layer & Transport Layer
 
Computer network (12)
Computer network (12)Computer network (12)
Computer network (12)
 
ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.ppt
ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.pptip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.ppt
ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.ppt
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Internet Protocol.pdf
Internet Protocol.pdfInternet Protocol.pdf
Internet Protocol.pdf
 
Tcp
TcpTcp
Tcp
 
Internetworking
InternetworkingInternetworking
Internetworking
 

Plus de selvakumar_b1985

Plus de selvakumar_b1985 (20)

Triggering transmission
Triggering transmissionTriggering transmission
Triggering transmission
 
Token ring
Token ringToken ring
Token ring
 
Subnetting
SubnettingSubnetting
Subnetting
 
Email Security
Email SecurityEmail Security
Email Security
 
RIP - Routing Information Protocol
RIP - Routing Information ProtocolRIP - Routing Information Protocol
RIP - Routing Information Protocol
 
Physical Mediums
Physical MediumsPhysical Mediums
Physical Mediums
 
OSPF - Routing Protocol
OSPF - Routing ProtocolOSPF - Routing Protocol
OSPF - Routing Protocol
 
Layering and Architecture
Layering and ArchitectureLayering and Architecture
Layering and Architecture
 
Issues in Data Link Layer
Issues in Data Link LayerIssues in Data Link Layer
Issues in Data Link Layer
 
ICMP
ICMPICMP
ICMP
 
Hybrid Channel Access Link
Hybrid Channel Access LinkHybrid Channel Access Link
Hybrid Channel Access Link
 
Hypertext Transfer Protocol
Hypertext Transfer ProtocolHypertext Transfer Protocol
Hypertext Transfer Protocol
 
Addressing Scheme IPv4
Addressing Scheme IPv4Addressing Scheme IPv4
Addressing Scheme IPv4
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
Framing Protocols
Framing ProtocolsFraming Protocols
Framing Protocols
 
Flow Control
Flow ControlFlow Control
Flow Control
 
FDDI
FDDIFDDI
FDDI
 
Ethernet
EthernetEthernet
Ethernet
 
Error control
Error controlError control
Error control
 
DNS
DNS DNS
DNS
 

Dernier

result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
 

Dernier (20)

Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 

Internetworking - IP

  • 2. Internetwork - Logical network built out of a collection of physical networks to provide some host to host packet delivery service. Router – the node that interconnects the network. Router is also called as gateway.
  • 3.
  • 4. Internet Protocol • Key tool used to build scalable, heterogeneous internetworks. • Also called as Kahn – Cerf protocol. Service model, o Provide host to host services. o Two parts, - Addressing Scheme – to identify all the hosts in the internetwork. - Datagram Model – for data delivery
  • 6. Internet Protocol  Also called as best effort model. Best effort model,  It makes no guarantee for datagram delivery.  If packets gets lost, corrupted, misdelivered or it fails to reach intended destination, it does nothing.  Unreliable service.
  • 8. Internet Protocol • Version (4 bit) – Version - version of the Internet Protocol. • HLen (4 bit) – Header Length – specifies the length of the header in 32 bit words. (Normally it contains value 5 i.e., 5 words – 20 Bytes). • TOS (8 bit) – Type of Service–defines type of service that allows packets to be treated differently based on the application need. (i.e., priority to packets) • Length (8 bit) –length of the datagram including the header in bytes. (Maximum value is 65,525 bytes).
  • 9. Internet Protocol • Identifier, flag, offset – used in fragmentation. • Flag: - DF- do not fragment bit. If this bit is 1, we cannot fragment that packet. - M – More fragment bit. This bit is one when more fragments to follow. • TTL (8 bit) –Time to live–number of seconds that the packet would be allowed to live (default value is 64) Reserved DF LF or M
  • 10. Internet Protocol • Protocol (8 bit) –demultiplexing key for higher level layer protocols. • TCP – 6 • UDP – 17 • Checksum (16 bit) – used to detect errors in header. - Checksum is calculated by considering the entire header as a sequence of 16 bit words, adding them and taking the ones compliment of the result • SourceAddr, DestAddr (32 bit each)–IP address of the source and destination host.
  • 11. Internet Protocol – Fragmentation and Reassembly Fragmentation and Reassembly, • In a heterogeneous collection of networks, each network has its own capacity to receive a packet called Maximum Transmission Unit (MTU). • MTU – largest IP datagram that it can carry in a frame. • Ethernet can accept up to 1500 bytes long packet. For FDDI, it is 4500 bytes long and for PPP 512 bytes long. • Fragmentation occurs in a router when it receives a datagram that it wants to forward over a network which has MTU <IP datagram size
  • 12. Internet Protocol – Fragmentation and Reassembly • Reassembly is done at the receiving host • All the fragments carry the same identifier in the Ident field • IP does not recover any missing fragments.
  • 13. Internet Protocol – Fragmentation and Reassembly Two important points, • Each fragment is itself a self-contained IP datagram that is transmitted over a sequence of physical networks, independent of other fragments. • Each IP datagram is re-encapsulated for each physical network over which it travels.
  • 14. (a) Unfragmented packet (b) fragmented packets
  • 15. Internet Protocol – Fragmentation and Reassembly In the above mentioned model, fragmentation is occurred in R2 (router 2). • When the packet (1400 bytes of data) arrives at R2, which has an MTU of 532 bytes, so it has to be fragmented. • 532 bytes MTU can hold 512 bytes of data + 20 bytes of IP header. • IP header fields used in fragmentation, • Flags, Reserved DF LF or M lf (last fragment) or M (More fragment) bit – set when more fragments to follow.
  • 16. Internet Protocol – Fragmentation and Reassembly • Offset – used to identify the starting byte of the fragment. - In first fragment it sets to 0. - Offset field counts 8 bytes. - In our example, offset field in the second fragment is 64 i.e., 512 / 8. • Ident (Identifier) – used to identify the packet to which the fragments are belongs to.