Ip datagram format, Computer Network Security


 Datagrams may have different sizes i.e. Header area is generally fixed (20 octets) but can have various options. Data area may contain between 1 octet and 65.535 octets (216-1).Generally, data area is much bigger than header.


 Header contains all information required to deliver datagram to the receiver computer. It has:

  • Destination address
  • Source address
  • Identifier
  • Other delivery information

Router checks header of every datagram and forwards datagram along path to destination.


Posted Date: 8/1/2012 7:55:48 AM | Location : United States

Related Discussions:- Ip datagram format, Assignment Help, Ask Question on Ip datagram format, Get Answer, Expert's Help, Ip datagram format Discussions

Write discussion on Ip datagram format
Your posts are moderated
Related Questions
Ask question #Minimum 100 words acceptwwwed#

Data Classification and Management Corporate and military organizations use a several of classification schemes. Information owners are responsible for classifying information a

B a s i c functions of e-mail system are given as follows: C o mp o sition refers to the procedure of creating messages and the answers. Though any text editor can be

(a) What is a pseudorandom generator? Give an example describing how it works. (b) Explain the key components of a wireless network and their purpose. (c) Describe the authen

Application-Based IDS Application-based IDS (AppIDS) is an advanced version of HIDS. It examines application for abnormal events. The ability to view encrypted data is the uniqu

Problem a) Give three reasons why traditional Network Design approach is less appropriate for many of today's networks? b) The network requires of users are organized into m

Question 1 Explain any two types of security policies Question 2 What is security attack? Explain with examples Question 3 Explain different characteristics that i

Question 1 a) What is a NMS? Question 2 Explain about Structure of Management Information Question 3 A)In which UDP port number does a protocol entity receive message?

Benchmarking An alternative approach to risk management is Benchmarking. It is process of seeking out and studying practices in other organizations which one’s own organization de

i want to detec and classify network anomaly detection based on KDD99 data set using swarm intelligence