Ip datagram header format, Computer Network Security

IP DATAGRAM HEADER FORMAT:

 It is given in the figure below:

823_IP DATAGRAM HEADER FORMAT.png

 

In the table:

  • VERS denotes the version of IP.
  • H.LEN denotes the header length in units of 32-bits.
  • SERVICE TYPE denotes sender's preference for low latency, high reliability that is rarely needed.
  • TOTAL LENGTH denotes total octets in datagram.
  • IDENT, FLAGS, FRAGMENT OFFSET denotes the values used with fragmentation.
  • TTL denotes time to live decremented in each router; datagram discarded when TTL = 0.
  • TYPE denotes type of protocol carried in table e.g., TCP, UDP.
  • HEADER CHECKSUM denotes 1's complement of 1's complement sum.

SOURCE DIST IP ADDRESS denotes IP addresses of original source and ultimate

 

Posted Date: 8/1/2012 8:02:10 AM | Location : United States







Related Discussions:- Ip datagram header format, Assignment Help, Ask Question on Ip datagram header format, Get Answer, Expert's Help, Ip datagram header format Discussions

Write discussion on Ip datagram header format
Your posts are moderated
Related Questions
Question: (a) What is the use of digital certificate? (b) What is meant by a hierarchical trust model in a Public Key Infrastructure? How does the Pretty Good Privacy (PG

(a) What are the different architectures for wireless networks? (b) Explain how WEP authentication and encryption works, describe the vulnerability. (c) In what ways are secu

Question An organization is planning to connect its networks to the Internet. The network is located within a four story building. A web server supporting online sales is also

(a) Illustrate what you understand by Nyquist Capacity Theorem? (b) Consider we wish to transmit at a rate of 64 kbps over a 4 kHz noisy but error-free channel. What is the mini

Hypothetical reliable data transfer protocol: A jumping window based Go-back-N  ARQ protocol for file transfer using UDP as the transport protocol: In this protocol, a window o

what is hacking

i want to detec and classify network anomaly detection based on KDD99 data set using swarm intelligence

Vulnerability Identification Specific avenues threat agents can exploit to attack an information asset are known as vulnerabilities. Examine how each threat can be generated and

Question: Human telephone conversations are characterized by irregular pauses, alternating with irregular bursts of speech. In contrast, communication via computers is char

Information System Security 1. Write about: a. Potential Risks to Information Systems b. Factors to be addressed for making information systems more secure 2. Write about t