Ipv6 packet format - network layer and routing , Computer Networking

IPv6 packet Format

The format  of an IPv6 header is shown  in figure. Although IPv6 addresses are four  times  the size  of IPv4 address  the basic  IPv6 header is only twice the size of an Ipv4 header thus decreasing the  impact  of the larger address  fields. The files  of the IPv6 header are:

Version : This represents the IP version number. This  fields  value is 6 for IPv6 and 4 for IPv4. This field  is in the same location as the version  fields  in the IPv6 header  making it  simple for an IP node  to quickly distinguish an IPv4 packet  from  an IPv6 packet.

426_IPv6 packet Format.png

                                                                   Figure IPv6  packet format

Priority : This  enables a source  to identity  the desired delivery priority of the  packet .

Flow label: This  is used by a source to identify associated  packet  needing the  same  type of special handling. Such  as a real time  service  between a pair  of hosts .

Payload length: This  is the length of the portion of the  packet following  the header in octets. The  maximum  value  in this field is 65.535 if this field  contains zero it  means that the packet contains a payload larger than 64 K bytes and the actual  payload length value  is carried in a jumbo payload hop by hop option.

Next heard : This  identifies the type  of header  immediately followings  the eIPv6 header  and uses the same  values as the IPv4 protocol fields  where applicable. The next  header fields  can indicate an options  header  higher  layer  protocols  or no protocols above IP.

Hop limit: This  specifies the maximum  number of hops that a packet may take before  it is discarded. This value is set by the source and decremented by one by each  node  that forwards the packet the packet is discarded if the hop limit reaches zero. The comparable field in IPv4 is the TTL field it was renamed  for IPv6 because the value  limits  the number  hops, not  the amount  of time  that a packet  can stay in the  network.

Source address :This  is the IPv6 address of the originator of the  packet.

Destination address: This is the IPv6 address of the intended recipients of the packet.

 

 

Posted Date: 3/16/2013 5:56:24 AM | Location : United States







Related Discussions:- Ipv6 packet format - network layer and routing , Assignment Help, Ask Question on Ipv6 packet format - network layer and routing , Get Answer, Expert's Help, Ipv6 packet format - network layer and routing Discussions

Write discussion on Ipv6 packet format - network layer and routing
Your posts are moderated
Related Questions
Two hosts are connected by a path made of four links as shown in the figure below. The links are of data rate R = 2 Mbps each. Host A has a file of size F = 1,000,000 bytes to tran

A.) JPEG and PICT B.) MPEG and MIDI C.) ASCII and EBCDIC For example, the Presentation layer would be liable for changing from EDCDIC to ASCII. Data compression, decompres

Question : (a) Describe, with the aid of a diagram, a hybrid topology of a network of your choice. (b) Briefly explain the similarity and differences between a switch and

Write discussion on Associative mapping - computer architecture.

The Received Message If  we didn't mention  another  class of header lines that are  inserted by the SMTP receiving  server. The receiving  server upon receiving a message wit

What is the default CDP broadcast update rate for Cisco routers? Ans) Cisco Discovery Protocol is a proprietary protocol to permit you to access configuration information on oth

This example illustrate the use of lastprivate clause void for_loop (int n, float *a, float *b) { int i; #pragma omp parallel { #pragma omp for lastprivate(i) for

Router Routing achieved commercially popularity in the mid - 1980s - at a time when large-scale Internetworking began to change the fairly simple, homogeneous environments. Rou

State the example of intranet security Imagine a situation when a company develops a major new product secretly using its Intranet. Hackers break the security and take away all

UNIX For Multiprocessor System:- The UNIX operating system for a multiprocessor system has a number of additional features as compared to the normal UNIX operating system.  Let