Ip datagram format, Computer Network Security

IP DATAGRAM SIZE:

 Datagrams may have different sizes i.e. Header area is generally fixed (20 octets) but can have various options. Data area may contain between 1 octet and 65.535 octets (216-1).Generally, data area is much bigger than header.

FORWARDING DATAGRAMS:

 Header contains all information required to deliver datagram to the receiver computer. It has:

  • Destination address
  • Source address
  • Identifier
  • Other delivery information

Router checks header of every datagram and forwards datagram along path to destination.

 

Posted Date: 8/1/2012 7:55:48 AM | Location : United States







Related Discussions:- Ip datagram format, Assignment Help, Ask Question on Ip datagram format, Get Answer, Expert's Help, Ip datagram format Discussions

Write discussion on Ip datagram format
Your posts are moderated
Related Questions
The three primary types of network protection are the same as the three primary areas where a network can be attacked. Every network needs protection against people-related, hardwa

QUESTION: (a) Show the Negative Cycle Algorithm in Minimum Cost Flows. (b) List the steps added in finding a Negative Cycle. (c) Apply Dijkstra's algorithm on the subs

Question: (a) For the bit stream 010011, sketch the waveforms for each of the code indicated. Assume the following: the signal level for the previous bit for NRZI was a 1

According to the case, The EZ Company introduced a new technology, focusing on the principles of informationintegration and visualization. The company started negotiatinga saleto a

INTRODUCTION TO PHYSICAL SECURITY The Physical security addresses design, execution, and maintenance of countermeasures which protect physical resources of an organization. The

Problem (a) Give two reasons for companies to implement security measures. (b) What is the regulatory expectation regarding i. healthcare information, ii. financial

QUESTION: (a) Suppose the graph below, use the Flow Decomposition method to list the cycles and paths produced. (b) Describe how Lower Bounds on Arc Flows are eliminated

Question (a) Inspect the following ifconfig output of an IPv6 interface: i. What is the hidden Hardware Address of the interface on Line #1? ii. What is the hidden subn

Illustrate about TinySec Protocol TinySec is implemented on the link layer and addresses security requirements of the resource staffed nodes in the WSN based on the link layer

Hardware, Software, and Network Asset Identification What information attributes to track is dependent on: •    Requires of organization/risk management efforts •    Management