Ip datagram header format, Computer Network Security

IP DATAGRAM HEADER FORMAT:

 It is given in the figure below:

823_IP DATAGRAM HEADER FORMAT.png

 

In the table:

  • VERS denotes the version of IP.
  • H.LEN denotes the header length in units of 32-bits.
  • SERVICE TYPE denotes sender's preference for low latency, high reliability that is rarely needed.
  • TOTAL LENGTH denotes total octets in datagram.
  • IDENT, FLAGS, FRAGMENT OFFSET denotes the values used with fragmentation.
  • TTL denotes time to live decremented in each router; datagram discarded when TTL = 0.
  • TYPE denotes type of protocol carried in table e.g., TCP, UDP.
  • HEADER CHECKSUM denotes 1's complement of 1's complement sum.

SOURCE DIST IP ADDRESS denotes IP addresses of original source and ultimate

 

Posted Date: 8/1/2012 8:02:10 AM | Location : United States







Related Discussions:- Ip datagram header format, Assignment Help, Ask Question on Ip datagram header format, Get Answer, Expert's Help, Ip datagram header format Discussions

Write discussion on Ip datagram header format
Your posts are moderated
Related Questions
(a) Define what you understand by the following terms in Network Flows: i) UnDirected Path ii) Directed Path iii) Directed Cycle. iv) Tree In each of the above, expla

ROUTING TABLES AND ADDRESS MASKS Additional information is saved in routing table. Destination is kept as network address. Next hop is saved as IP address of router. Address m

Firewalls A firewall in an information security program that prevents specific types of information from moving between the outside world and the inside world. The firewall may

Question: a) There are two basic approaches to dealing with errors in the presence of pipelining. One way is Go-Back-N and the other strategy is Selective Repeat. i. Explain

?Examples should include direct costs items, indirect costs items, as well as variable costing. ?What are at least 5 types of expenses that are associated with manufacturing the

CarALouer provides rental of cars to its customer on a regional basis i.e. a car is attached to a regional home-base which also houses a regional office of the company. Each regi

Problem (a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. The second screen capture is from the data portion of the frame.


Size of Option field of an ip datagram is 20 bytes. What is the value of HLEN? What is the value in binary?

a. PKI and PGP are two methods for generating and managing public keys for use in protocols such as secure email. Compare and contrast the trust models for public keys used in PKI