Ip datagram,its transmission and frames, Computer Network Security

IP DATAGRAM

Various options can be included to IP header, e.g., source route, record route and timestamp. Header with no function has H. LEN field value 5; data starts immediately after DESTINATION IP ADDRESS. Options are included between DESTINATION IP ADDRESS and packet data in multiples of 32 bits.  Header with 96 bits of function has H. LEN field value 8.

 

DATAGRAM TRANSMISSION AND FRAMES:

 IP Internet layer has basic tasks: It creates datagram, calculates next hop and gives to network interface layer. Network interface layer has basic tasks: It related next hop address to hardware address and makes datagram for transmission. But hardware frame doesn't understand IP how datagram is send.

 

Posted Date: 8/1/2012 8:03:54 AM | Location : United States







Related Discussions:- Ip datagram,its transmission and frames, Assignment Help, Ask Question on Ip datagram,its transmission and frames, Get Answer, Expert's Help, Ip datagram,its transmission and frames Discussions

Write discussion on Ip datagram,its transmission and frames
Your posts are moderated
Related Questions
In Star topology all computers are connected using a central device known as hub. Star networks are one of the most general computer network topologies. In its simplest way, a

ADDRESS RESOLUTION WITH MESSAGE EXCHANGE An alternative to local calculation is a distributed function. A computer that requires to find an address transmits a message across

Cipher Methods There are 2 methods of encrypting plaintext: • Bit stream method – every bit in the plaintext bit is transformed into a cipher bit one bit at a time. • Block cip

Packet Filtering Firewall Packet filtering is a network security mechanism that works by controlling what data can flow in and out of the network. The basic device that interco


ACCESS CONTROL DEVICES Successful access control system includes number of components, which depends on system’s requirements for authentication and authorization. Powerful auth

Scenario: A network with individual hosts (really, virtual machines) can run HTTP (web) servers that are available to the outside. (Here, available means the ability to read and wr

The following message was enciphered with a Vigenère cipher. aikiaawgfspxeppvjabjnivulfznzvkrlidamsmyamlvskniyffdpbwtnxsvvbtnamvltsefoeycztkomylmerkwrs deusjgecmzkwvnreeyp

Question: (a) State whether the following statements are TRUE or FALSE. Justify your answer. i. A good site security policy will require that users use computer generated p

Problem 1: What does the SNMP access policy show? SNMP community diagram SNMP access policy Problem 2: Does there exist any formal functional specificat