Ip datagram header format, Computer Network Security

IP DATAGRAM HEADER FORMAT:

 It is given in the figure below:

823_IP DATAGRAM HEADER FORMAT.png

 

In the table:

  • VERS denotes the version of IP.
  • H.LEN denotes the header length in units of 32-bits.
  • SERVICE TYPE denotes sender's preference for low latency, high reliability that is rarely needed.
  • TOTAL LENGTH denotes total octets in datagram.
  • IDENT, FLAGS, FRAGMENT OFFSET denotes the values used with fragmentation.
  • TTL denotes time to live decremented in each router; datagram discarded when TTL = 0.
  • TYPE denotes type of protocol carried in table e.g., TCP, UDP.
  • HEADER CHECKSUM denotes 1's complement of 1's complement sum.

SOURCE DIST IP ADDRESS denotes IP addresses of original source and ultimate

 

Posted Date: 8/1/2012 8:02:10 AM | Location : United States







Related Discussions:- Ip datagram header format, Assignment Help, Ask Question on Ip datagram header format, Get Answer, Expert's Help, Ip datagram header format Discussions

Write discussion on Ip datagram header format
Your posts are moderated
Related Questions
STAR TOPOLOGY In this topology, all devices are attached to a central point, which is sometimes known as the "Hub" as given in the diagram below.   Figure: An ideal

(a) (i) If m = p·q·r where p, q, and r are prime numbers, what is Φ(m)? (ii) Therefore, Determine Φ(440). (b) Describe the following terms as used in cryptography: (i)

QUESTION (a) (i) Describe Phishing attacks. (ii) Distinguish between Phishing and Spear Phishing attacks. (b) Describe two instances where an attacker sniffing on a netwo

QUESTION: (a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. Give the source MAC address for the frame in hexadecimal; the sourc

Question: (a) Which type of attacker represents the most likely and most damaging risk to your network? (b) What is the basic reason that social engineering attacks succeed?

Problem (a) IT Service Support within the ITIL framework is divided in a number of processes. Compare and contrast the following processes: i. Incident Management and Problem M

Ethernet is a commonly used LAN technology. It was discovered at EXROX PARC(Palo Alto Research Center) in 1970s.Xerox, Intel and Digital described it in a standard so it is also kn

(a) Define what you understand by the following terms in Network Flows: i) UnDirected Path ii) Directed Path iii) Directed Cycle. iv) Tree In each of the above, expla

POINT-TO-POINT: In Point-to-Point topology there are two kind of topologies. 1) STAR topology 2) TREE topology In star topology each and every computer is connect

attacks on crytography