Ip datagram,its transmission and frames, Computer Network Security

IP DATAGRAM

Various options can be included to IP header, e.g., source route, record route and timestamp. Header with no function has H. LEN field value 5; data starts immediately after DESTINATION IP ADDRESS. Options are included between DESTINATION IP ADDRESS and packet data in multiples of 32 bits.  Header with 96 bits of function has H. LEN field value 8.

 

DATAGRAM TRANSMISSION AND FRAMES:

 IP Internet layer has basic tasks: It creates datagram, calculates next hop and gives to network interface layer. Network interface layer has basic tasks: It related next hop address to hardware address and makes datagram for transmission. But hardware frame doesn't understand IP how datagram is send.

 

Posted Date: 8/1/2012 8:03:54 AM | Location : United States







Related Discussions:- Ip datagram,its transmission and frames, Assignment Help, Ask Question on Ip datagram,its transmission and frames, Get Answer, Expert's Help, Ip datagram,its transmission and frames Discussions

Write discussion on Ip datagram,its transmission and frames
Your posts are moderated
Related Questions
Normal 0 false false false EN-US X-NONE X-NONE

Question: a) You are using Active Directory Users under Windows Server 2003 and Computers to configure user objects in your domain, and you are able to change the address and

#questioAn elliptic curve y^2=x^3+ax+b(mod29) includes points P=(7, 15) and Q=(16, 13) a)Determine the equation of the crve b) Determine all values of x for which there is no point

802.11 WIRELESS LANs AND CSMA/CA:  IEEE 802.11 is standard wireless LAN that needs radio signals at 2.4GHz. Its speed is 11Mbps. The older computers use radio signals at data

TCP and UDP End-to-end delivery application is connection less. The basic function of connectionless service are as given: It adds extension of LAN abstraction. It has simp

Question: (a) Explain and illustrate with a drawing the three-layer feedforward multilayer perceptron neural network. (b) Summarize the standard backpropagation algorithm in

The Security Systems Development Life Cycle (SecSDLC) The same phases which is used in traditional SDLC can be adapted to support specialized implementation of IS project,At its


TCP-RELIABLE TRANSPORT SERVICE INTRODUCTION:  TCP is the major transport protocol architecture in the TCP/IP suite. It uses unreliable datagram function offered by IP whe

i have an idea of clustering in wsns . where each and every sensor node use the reputation scheme and while clustering provide help against the selfishness atatck of the sensor nod