Ip datagram header format, Computer Network Security


 It is given in the figure below:



In the table:

  • VERS denotes the version of IP.
  • H.LEN denotes the header length in units of 32-bits.
  • SERVICE TYPE denotes sender's preference for low latency, high reliability that is rarely needed.
  • TOTAL LENGTH denotes total octets in datagram.
  • IDENT, FLAGS, FRAGMENT OFFSET denotes the values used with fragmentation.
  • TTL denotes time to live decremented in each router; datagram discarded when TTL = 0.
  • TYPE denotes type of protocol carried in table e.g., TCP, UDP.
  • HEADER CHECKSUM denotes 1's complement of 1's complement sum.

SOURCE DIST IP ADDRESS denotes IP addresses of original source and ultimate


Posted Date: 8/1/2012 8:02:10 AM | Location : United States

Related Discussions:- Ip datagram header format, Assignment Help, Ask Question on Ip datagram header format, Get Answer, Expert's Help, Ip datagram header format Discussions

Write discussion on Ip datagram header format
Your posts are moderated
Related Questions
QUESTION a) Explain the terms traffic engineering, class-based queuing, shaping and grooming in an MPLS network. b) Using an example topology, illustrate the label swi

Q. Explain about Security aware protocols? The security-Aware ad hoc Routing (SAR) protocol based on the security attributes integrated into the ad hoc route discovery provides

COMPONENTS OF AN INFORMATION SYSTEM The components of an information system are software, data, hardware, people, procedures and Networks. These 6 components are critical to ena

Question (a) Name 3 popular electronic mail access protocols? (b) i. What is DNS? ii. Briefly, describe what it does and how it works? iii. Why does DNS use a dist

Problem (a) IT Service Support within the ITIL framework is divided in a number of processes. Compare and contrast the following processes: i. Incident Management and Problem M

(a) Using the extended Euclidean algorithm, find the multiplicative inverse of 504 mod 67. (b) Decrypt the following ciphertext, which has been encrypted using Caesar cipher:

Question: (a) A Wireless Mesh Network (WMN) is a communications network made up of radio nodes organized in a mesh topology. i. Describe the function of a TAP in WMNs. ii.

The project will be involving a design and a report of which explain the simulation and how it functions. The aim of the project is to help the administrators and staff at the war

Selecting a Risk Control Strategy Risk controls involve selecting one of the 4 risk control strategies for every vulnerability. The flowchart is shown in the figure given below