Time
11 hours
Difficulty
Intermediate
CEU/CPE
15

Video Transcription

00:00
Hello. Welcome back, Siskel Certified Design Associate Module eight Lights and 8.1
00:06
I'm your instructor way.
00:08
In the previous video, we talked about the Enterprise, French architecture and the tiny worker design. From this video we will begin to introduce a P D for header
00:21
Which TV for you'd are the president's bits Located in a key particle feud
00:28
B type of the service fueled See Ikey Options Field.
00:33
The destination address will be type of the service.
00:40
Here's the topic of Will Discuss
00:44
I t header.
00:45
The best way to understand I p B for is to note I keep the for Haider and all eights fields segments from TCP all the UDP are passed on to the I p for processing
00:58
the key Hider is a pendant to the TCP or UDP segment the TCP all UDP segment that then becomes the data.
01:07
The I p. D for Haider is 20 bites announced when Eddie uses and no option of use.
01:15
The I p had her includes the addresses of the sending host on the destination hosts and also includes the operator particle, A future for privatization. On a few differ fragmentation.
01:27
This diagram shows the i p Haider phone. It will start to explain from the verse in this feud is for pizza and lance. It indicates the headers form it. Based on the version number
01:42
version for is the current version. Therefore, this feud is a sight to 0100 foreign battery for I p D for package.
01:52
This field is the satyrs. You're 110 16 battery in I p v six networks.
01:59
I h l Internet Hydra length. This viewed is orbiting length. It indicates the land off the Hatter in 32 beats works for bites so that at the beginning of the data can be found in i p header.
02:15
The minimum of value for validate a hider 5 32 bit words
02:20
is 50101 type of the service.
02:24
This feud is eight bits in mouth quality of service private owners of such as presidents or D. S. S c p r. Following is viewed. These are explained further in a folding slides. Total length.
02:38
This view is 16 bits in around a the re presents the length of the dead pentagram or pack it in bites, including the hider and data. The maximum lands of an I P packet can be two to the power off the 16 minus one you call 65
02:58
535 bites.
03:00
Rodders used this feud to determine whether fragmentation is necessary By comparing the total length with the outgoing and to you
03:09
identification, These field is a 16 bits in mouth a the identifies fragments for reassembly
03:19
flags.
03:21
This field is a three bitchy mouth.
03:23
Hey, the indicates whether the packet it can be fragmented on a weather. More fragments fal
03:29
zero is reserved and sad zero bit one indicates may fragment zero were Do not fragment one
03:37
it to
03:38
indicates last fragment zero or more fragments to follow one fragment off site This field is a 13 18 lamp. It indicates in bites where the packet these fragment of belongs the first of fragment has an upside of a zero
03:57
time to live This viewed is eight *** Ruth. It indicates the maximum of time. The packet is remained on the network Each rotter decree mints this field by one for loop avoidance. If this feud is zero, the package must be discarded.
04:13
These scheme permits rodders that this garden the liberal packet
04:17
prodigal this view is eight beating mouth. It indicates the operator particle, right? The Internet assign members authority I and A is responsible for assigning particle values.
04:32
This table shows us some key particle numbers.
04:38
You can't find a full list at eye on a website. Okay, let's move on to a hider. Checks. Um,
04:46
hotter chicks. Um, this feud is a 16 between them. The checks, um, does not include the dead. A portion of the packet in the calculation. The checks, um, is a re computed and verified at each point that I P header is processed.
05:00
Source Address These few days of 32 bits in mouth,
05:04
it is the sender's ikey address. That's the nation address.
05:09
This field is a 32 beauty mouth.
05:12
It is the receivers ikey address and then i p options field.
05:16
This feud is a variable announced. The options are provided for control functions that are useful in some situations, but unnecessary for the most common communications specific options. Air security Loose the source. Rotting strictness Source. Routing
05:35
record route on the time stamp.
05:39
Patty,
05:40
this view it is a variable you mouth.
05:43
It insures that of the I. P. Haider ends on the 32 Bebe honoring
05:48
this table summarizes the feuds off the I. P. Hyder. You can spend some time on this one type of a service. The T. O s feud off the I. P. Haider is used to despise it. By Q wise Prime Attar's rodders and the layer three stretches are looking at an A T. O s feud.
06:06
Apply policies such as Priority two packets. Based on the
06:12
marking on example is a rotter prioritizing time sensitive peck. It's over regular data traffic such as a Web or E mail, which is not a time sis city.
06:23
The past feud has undergone several definitions. Sense. RFC Send anyone
06:30
This diagram shows the several formats of up T O s turns a few based on the evolution of our F sees. 7 91
06:41
1981 13 49 1992 24 74 in 1998 on the 31 68 in 2001 before William Pryor draft that described is the evolution
06:56
the first left? Most bits are the I P president's bits this bits to find values that are used to bike US methods.
07:05
The president's bits especially helping marking packets to give them a differentiated achievement where the different priorities, for example, voice over I P packets can get a preferential treatment over regular data. Pad case rfc seven. Anyone
07:24
describes the president's bits on showing in this table
07:27
default traveling to settle with a 00 in the president's bits. Voice try because he usually said to one a one critical to give it a priority over normal traffic on a play. Occasions such as FTP as a sign. A normal priority because it had tolerate Network L Agency and a packet of loss
07:46
Cocula. Retransmissions. Air Technically acceptable for
07:49
normal traffic,
07:54
PDS CP values the network of designer uses the S C P that gave a priority to keep package using Siskel Rogers Rogers should be configured to map of this code. Appliance toe pH Bees were the pureeing or other piano way of the man. Even techniques
08:11
this table compares the STP and presidents value was used to assign priority and apply policies. Tacky packets. This table shows the president's values predefined a an Cisco vitals are FC 25 97 defies recommended values for a F co points
08:31
with low medium
08:33
on high presidents on this table shows the recommended A F code of values are FC 25 98 Defiance the E f p h b for low loss laden. See, I'm assured to be, in a way, the types of traffic. This is considered a premium service
08:52
traffickers such as avoid eyes classified as the F
08:56
as yet if this co pointer for yes is one
09:00
011 was Europe right, which corresponds to the S C P value of about 46. Well, you are come figuring Francisco rodders.
09:09
The following options are pretty configured and summarized Defying the values for D S S c p These Tae bo shows the i p President's about his pre defined in that Cisco Battles right?
09:20
Learning check Question number one. Which is it? Enough to America Aria are for i p before addresses a ripe b a r i n c i n a d i Triple e e a p a nice sea right North America. Our e. R
09:39
means the Russian American
09:41
regional Internet Rage writes three
09:43
ripe r i p e means French for European I p networks. I r i n. It's American registry for Internet numbers. I n a is Internet assigned Numbers Authority I Triple E.
09:58
I Institute of Electrical on the electronics Engineers A P and I see it's Asia Pacific Network Information Center.
10:07
So we should go in the e. R. I am American registry for Internet numbers. It is the North America Regional Internet registry for I p v for addresses.
10:20
Question number two The D s field of a I D. S C. P is capable. How many cold points?
10:26
Right? The D s future allocates a six B It's in the past feud that's making it a capable off 64 distinct code points. So we go in the 64
10:37
in today's brief lecture with disgust. I pee before header
10:41
Any questions? Feel free to contact me. Otherwise I will see you in extra video. Bye for now.

Up Next

CCDA (Cisco Certified Design Associate)

In this CCDA training you will learn the knowledge and skills involved in attaining your Cisco Certified Design Associate (CCDA) certification.

Instructed By

Instructor Profile Image
Wayne Xing
Network Solutions Architect
Instructor