Ip datagram format, Computer Network Security

IP DATAGRAM SIZE:

 Datagrams may have different sizes i.e. Header area is generally fixed (20 octets) but can have various options. Data area may contain between 1 octet and 65.535 octets (216-1).Generally, data area is much bigger than header.

FORWARDING DATAGRAMS:

 Header contains all information required to deliver datagram to the receiver computer. It has:

  • Destination address
  • Source address
  • Identifier
  • Other delivery information

Router checks header of every datagram and forwards datagram along path to destination.

 

Posted Date: 8/1/2012 7:55:48 AM | Location : United States







Related Discussions:- Ip datagram format, Assignment Help, Ask Question on Ip datagram format, Get Answer, Expert's Help, Ip datagram format Discussions

Write discussion on Ip datagram format
Your posts are moderated
Related Questions
(a) What are the different architectures for wireless networks? (b) Explain how WEP authentication and encryption works, describe the vulnerability. (c) In what ways are secu

Question (a) Inspect the following ifconfig output of an IPv6 interface: i. What is the hidden Hardware Address of the interface on Line #1? ii. What is the hidden subn

IP DATAGRAM SIZE:  Datagrams may have different sizes i.e. Header area is generally fixed (20 octets) but can have various options. Data area may contain between 1 octet and 6

Question: (a) What is the use of digital certificate? (b) What is meant by a hierarchical trust model in a Public Key Infrastructure? How does the Pretty Good Privacy (PG

hi have a look and tell me if u can do it. if u can do Q1then i will allow u to do Q2

QUESTION (In this question, you will need to use the ISO 27001:2005 and ISO 27002:2005 standards) For each of the situations below, comment on the following: 1. Mention

how can you enter the ASVAB practice test on line?

QUESTION 1 Risk analysis helps companies prioritize their risks and shows management the amount of money that should be applied to protecting against those risks in a sensib

What do you understand by the DNS? Explain the usage of the resource rec or ds. Domain Name System is described below: The Domain Name Service (DNS) is the hierarchi

(a) Show four Network Security attacks. How do they compromise security? (b) In what ways do the following devices or services contribute to security: (i) Firewall (ii) In