Ip datagram,its transmission and frames, Computer Network Security


Various options can be included to IP header, e.g., source route, record route and timestamp. Header with no function has H. LEN field value 5; data starts immediately after DESTINATION IP ADDRESS. Options are included between DESTINATION IP ADDRESS and packet data in multiples of 32 bits.  Header with 96 bits of function has H. LEN field value 8.



 IP Internet layer has basic tasks: It creates datagram, calculates next hop and gives to network interface layer. Network interface layer has basic tasks: It related next hop address to hardware address and makes datagram for transmission. But hardware frame doesn't understand IP how datagram is send.


Posted Date: 8/1/2012 8:03:54 AM | Location : United States

Related Discussions:- Ip datagram,its transmission and frames, Assignment Help, Ask Question on Ip datagram,its transmission and frames, Get Answer, Expert's Help, Ip datagram,its transmission and frames Discussions

Write discussion on Ip datagram,its transmission and frames
Your posts are moderated
Related Questions
USING ICMP TO TEST REACHABILITY:  ICMP can also be used to test several tools. An Internet host A, is reachable from another host B, if data packets can be send from A to B. P

ASSET IDENTIFICATION AND VALUATION This process begins with identification of assets that includes all elements of an organization’s system (people, procedures, data and informa

Hardware, Software, and Network Asset Identification What information attributes to track is dependent on: •    Requires of organization/risk management efforts •    Management

CARRIER  SENSE MULTIPLE ACCESS (CSMA) There is no central access management when computers transfer on Ethernet. For this solution the Ethernet employs CSMA to coordinate tran

Digital Signatures Digital Signatures are encrypted messages which can be proven mathematically to be authentic. These are created in response to rising requirement to verify in

Question 1: Why do we need a Law of Contract? a Explanation Reasons to have a law of contract b Explain the close procurement project process - Explanation (causes,

(a) (i) Bob has public RSA key (n = 77, e = 7). Show that Bob's private key is (d = 43). (ii) Alice wants to send the message m = 13 to Bob. She encrypts the message usi

define .

Problem : (a) Provide one possible classification of PCA, ART, RBF, and Fuzzy ARTMAP networks. (b) Describe in detail the characteristics of Radial Basis Function Neural Net