Ip datagram header format, Computer Network Security

IP DATAGRAM HEADER FORMAT:

 It is given in the figure below:

823_IP DATAGRAM HEADER FORMAT.png

 

In the table:

  • VERS denotes the version of IP.
  • H.LEN denotes the header length in units of 32-bits.
  • SERVICE TYPE denotes sender's preference for low latency, high reliability that is rarely needed.
  • TOTAL LENGTH denotes total octets in datagram.
  • IDENT, FLAGS, FRAGMENT OFFSET denotes the values used with fragmentation.
  • TTL denotes time to live decremented in each router; datagram discarded when TTL = 0.
  • TYPE denotes type of protocol carried in table e.g., TCP, UDP.
  • HEADER CHECKSUM denotes 1's complement of 1's complement sum.

SOURCE DIST IP ADDRESS denotes IP addresses of original source and ultimate

 

Posted Date: 8/1/2012 8:02:10 AM | Location : United States







Related Discussions:- Ip datagram header format, Assignment Help, Ask Question on Ip datagram header format, Get Answer, Expert's Help, Ip datagram header format Discussions

Write discussion on Ip datagram header format
Your posts are moderated
Related Questions
What are Transmission Impairments? Explain the following concepts with respect to Transmission Impairments a) Attenuation b) Delay Distortion c) Noise ion #Minimum 100 words ac

WFABilling project in Java:  Project Title: WFABilling   Role                      : Developer Domain                 : Tele-Com Environment          : Java, J2EE, S

QUESTION (a) Mention two attitudes of a carer towards an inspector that could lead to negative outcomes (b) Give two performance indicators of Early Childhood Education that

People,Procedures,Data Asset Identification-Risk Management The human resources, data information and documentation assets are more difficult to identify. People having knowle

Question: (a) What is the major problem with public key encryption when compared to symmetric key encryption? (b) Consider the following protocol for communication between t


QUESTION a) Explain the terms traffic engineering, class-based queuing, shaping and grooming in an MPLS network. b) Using an example topology, illustrate the label swi

Question: Spreadsheet packages are widely used in Business. a) Explain why spreadsheets are so useful. b) Spreadsheet files are sometimes saved for use by other software

Spambot Detection: The  previous studies in this field  have focused on content and meta-content based features.  The main assumption in this area of spam detection of late is

Cost Benefit Analysis (CBA) The common approach for information security controls is economic feasibility of implementation. CBA is begun by evaluating the worth of assets which