Ipv6 packet format - network layer and routing , Computer Networking

IPv6 packet Format

The format  of an IPv6 header is shown  in figure. Although IPv6 addresses are four  times  the size  of IPv4 address  the basic  IPv6 header is only twice the size of an Ipv4 header thus decreasing the  impact  of the larger address  fields. The files  of the IPv6 header are:

Version : This represents the IP version number. This  fields  value is 6 for IPv6 and 4 for IPv4. This field  is in the same location as the version  fields  in the IPv6 header  making it  simple for an IP node  to quickly distinguish an IPv4 packet  from  an IPv6 packet.

426_IPv6 packet Format.png

                                                                   Figure IPv6  packet format

Priority : This  enables a source  to identity  the desired delivery priority of the  packet .

Flow label: This  is used by a source to identify associated  packet  needing the  same  type of special handling. Such  as a real time  service  between a pair  of hosts .

Payload length: This  is the length of the portion of the  packet following  the header in octets. The  maximum  value  in this field is 65.535 if this field  contains zero it  means that the packet contains a payload larger than 64 K bytes and the actual  payload length value  is carried in a jumbo payload hop by hop option.

Next heard : This  identifies the type  of header  immediately followings  the eIPv6 header  and uses the same  values as the IPv4 protocol fields  where applicable. The next  header fields  can indicate an options  header  higher  layer  protocols  or no protocols above IP.

Hop limit: This  specifies the maximum  number of hops that a packet may take before  it is discarded. This value is set by the source and decremented by one by each  node  that forwards the packet the packet is discarded if the hop limit reaches zero. The comparable field in IPv4 is the TTL field it was renamed  for IPv6 because the value  limits  the number  hops, not  the amount  of time  that a packet  can stay in the  network.

Source address :This  is the IPv6 address of the originator of the  packet.

Destination address: This is the IPv6 address of the intended recipients of the packet.

 

 

Posted Date: 3/16/2013 5:56:24 AM | Location : United States







Related Discussions:- Ipv6 packet format - network layer and routing , Assignment Help, Ask Question on Ipv6 packet format - network layer and routing , Get Answer, Expert's Help, Ipv6 packet format - network layer and routing Discussions

Write discussion on Ipv6 packet format - network layer and routing
Your posts are moderated
Related Questions
You should develop a system consisting of an application acting as a broker and several agents that need to communicate between them. The agents can only communicate in pairs (i.e.

Genome4U is a scientific research project at a large university in the United States. Genome4U has recently started a large-scale project to sequence the genomes of 250,000 volun


Wireless Phone Company (WLPC) is a provider of wireless phone service in the US with 100,000 customers serving mostly small markets. WLPC has just purchased additional airwaves in

Internet  Service Provider (ISP) This  supper fast  network  spanning  the world  from  one major  metropolitan area to another  is provided  by a handful of national internet

Explain Ethernet Frame. The heart of Ethernet system is the Ethernet Frame, which is used to deliver information among the computers. The frame having of a set of bits organize

Advantages There are  times when  using  packet filters makes  sense. If the  connections require high  throughput  or the protocols  has proprietary technology that makes  it

What are the IP address ranges for public and private IP address?

Managing and Securing the Web Utility of the Router Step 1: Configure web access. Navigate to the Administration section. Change the router password to cisco. For Web Uti

How Firewall configuration makes all the difference The greatest blunder that any company make is to just install a firewall and think that they have ensured perfect securit