Checksum - transport layer, Computer Networking

Checksum

This 16 bits field contain  the checksum. The  calculation of the   checksum for TCP follows  the same  procedure as the  described for  UDP. However the inclusion of the  checksum  in the UDP datagram  is optional  whereas the inclusion of the  checksum  for TCP is mandatory.

 

Posted Date: 3/12/2013 11:37:21 PM | Location : United States







Related Discussions:- Checksum - transport layer, Assignment Help, Ask Question on Checksum - transport layer, Get Answer, Expert's Help, Checksum - transport layer Discussions

Write discussion on Checksum - transport layer
Your posts are moderated
Related Questions
Full form of HTTPd It stands for HTTP daemon. HTTPd is the program run on a UNIX platform to establish a Web server. On other platforms, such as Microsoft Windows NT, the We

You are designing a network for a retail customer; they plan to have 5 locations initially with the main store acting as the warehousing depot.  Within the next year they are plann

What is NVT (Network Virtual Terminal) It is a set of rules explaining a very simple virtual terminal interaction. The NVT is used in the begin of a Telnet session.

Explain Peer-to-Peer Networking Model. A networking model where every workstation has equivalent capabilities and responsibilities is called as peer-to-peer model. There is no

What is OSPF? It is an Internet routing protocol that scales well, can route traffic with multiple paths, and uses knowledge of an Internet's topology to make precise routing de

What are the five major technologies that can be used to create Client/Server applications? Database Servers Groupware TP Monitors Distributed Objects Intranets.

Question 1 Write short notes on (i) Fiber Distributed Data Interface (ii) Serial Line Question 2 Explain Internet layer and transport layer Internet layer Tran

Company Access Company  access is that in which  end systems are connected in connecting end  systems in a organization or educational  institution into the network. On  co

Relevance and Protection regarding DNS Attacks While discussing about the relevance and protection of the database, there are many things which need to consider. Almost, may o

Can you explain routing loop issue in RIP protocol?