Ip datagram format, Computer Network Security

IP DATAGRAM SIZE:

 Datagrams may have different sizes i.e. Header area is generally fixed (20 octets) but can have various options. Data area may contain between 1 octet and 65.535 octets (216-1).Generally, data area is much bigger than header.

FORWARDING DATAGRAMS:

 Header contains all information required to deliver datagram to the receiver computer. It has:

  • Destination address
  • Source address
  • Identifier
  • Other delivery information

Router checks header of every datagram and forwards datagram along path to destination.

 

Posted Date: 8/1/2012 7:55:48 AM | Location : United States







Related Discussions:- Ip datagram format, Assignment Help, Ask Question on Ip datagram format, Get Answer, Expert's Help, Ip datagram format Discussions

Write discussion on Ip datagram format
Your posts are moderated
Related Questions
QUESTION There are generally five factors that will influence how you respond to computer security incidents- The effect the incident has on your business Legal issue

Let me know the details of protocol tcp/ip

UDP INTERACTION  UDP follows four kinds of interaction 1-to-1: One application can interact with one application. 1-to-many: One application can interact with many

Illustrate about TinySec Protocol TinySec is implemented on the link layer and addresses security requirements of the resource staffed nodes in the WSN based on the link layer

Deploying Host-Based IDSs -Proper implementation of HIDSs can be painstaking and time-consuming task .The process of deployment begins with implementing most critical systems fi

Question 1: Why do we need a Law of Contract? a Explanation Reasons to have a law of contract b Explain the close procurement project process - Explanation (causes,

The best results obtained in the PIIT classes have been when the technique has been used in tutorial groups, rather than have students submit individual reflections on particular c

For simplicity, each character is regarded as one data packet, which means that the data in each packet should have the max length of only 1 byte. Your own packet header (not th

Q. Attacks on wireless network WSN are vulnerable to attacks which compromise the integrity of the WSN nodes by decreasing the nodes' fault tolerance capabilities, data distrib

hi have a look and tell me if u can do it. if u can do Q1then i will allow u to do Q2