Ip datagram format, Computer Network Security

IP DATAGRAM SIZE:

 Datagrams may have different sizes i.e. Header area is generally fixed (20 octets) but can have various options. Data area may contain between 1 octet and 65.535 octets (216-1).Generally, data area is much bigger than header.

FORWARDING DATAGRAMS:

 Header contains all information required to deliver datagram to the receiver computer. It has:

  • Destination address
  • Source address
  • Identifier
  • Other delivery information

Router checks header of every datagram and forwards datagram along path to destination.

 

Posted Date: 8/1/2012 7:55:48 AM | Location : United States







Related Discussions:- Ip datagram format, Assignment Help, Ask Question on Ip datagram format, Get Answer, Expert's Help, Ip datagram format Discussions

Write discussion on Ip datagram format
Your posts are moderated
Related Questions
Suppose you are working for one of the leading credit reporting agencies that manages users' credit rating info with different financial institutions.  The company wishes to implem

Problem: (a) What is a firewall and which are its most important tasks? (b) What is the difference between default deny and default permit? Which advantages and disadvanta

Question (a) Consider that you enter the subsequent URL in the address bar of a popular web client and that both the server and client accepts HTTP version 1.1. i. What can be

Social Network development in Java: Project Title: SUGGESTLOCAL (Nov 2006-April 2007) Role             : Developer Domain        : Social Network Client          :

Government funding has been given to a university consortium establishing a repository of resources for school teachers. They have engaged you to develop a search facility for teac

What is Authentication/confirmation?  How it is different from  the Authorization/approval?  Explain in brief different authentication protocols along with their merits and demerit

Question: (a) Describe how IPSec provides data source authentication. (b) Which protocol can be used to provide limited traffic analysis confidentiality? Why is it "limite

Base lining •    Organizations do not have any contact to each other •    No two organizations are identical to each other •    The best practices are a moving target •    K

(a) Using the extended Euclidean algorithm, find the multiplicative inverse of 504 mod 67. (b) Decrypt the following ciphertext, which has been encrypted using Caesar cipher:

Question 1 (a) Explain briefly the following terms as used in network security: (i) Denial of service (DoS) attack (ii) Birthday attack (iii) DeMilitarized Zone