Ip datagram,its transmission and frames, Computer Network Security

IP DATAGRAM

Various options can be included to IP header, e.g., source route, record route and timestamp. Header with no function has H. LEN field value 5; data starts immediately after DESTINATION IP ADDRESS. Options are included between DESTINATION IP ADDRESS and packet data in multiples of 32 bits.  Header with 96 bits of function has H. LEN field value 8.

 

DATAGRAM TRANSMISSION AND FRAMES:

 IP Internet layer has basic tasks: It creates datagram, calculates next hop and gives to network interface layer. Network interface layer has basic tasks: It related next hop address to hardware address and makes datagram for transmission. But hardware frame doesn't understand IP how datagram is send.

 

Posted Date: 8/1/2012 8:03:54 AM | Location : United States







Related Discussions:- Ip datagram,its transmission and frames, Assignment Help, Ask Question on Ip datagram,its transmission and frames, Get Answer, Expert's Help, Ip datagram,its transmission and frames Discussions

Write discussion on Ip datagram,its transmission and frames
Your posts are moderated
Related Questions
what are the participant of marketing channal?

Electronic Mail: Electronic mail which is famous as e-mail, as it is known to its number of users, has been around for more than two decades. Before 1990, it was mainly used in

discuss the merits and demerits of computers freezing

- Alice, Bob and Charlie have a secret key a=3, b=4, c=5, in that order. - They would like to find a common secret key using Diffie-Hellan key exchange protocol (with g=2, p=5).

Problem a) Give three reasons why traditional Network Design approach is less appropriate for many of today's networks? b) The network requires of users are organized into m

how can i start thesis? Please mention so of examples?

1. For this project, assume that an organization has five servers. Server 1 has a TCO of $25,000, Servers 2 and 3 have a TCO of $37,000 each, and the remaining two servers— Servers

Question: (a) Distinguish between Steganograhy and Cryptography. (b) "Playfair cipher is more secure than Monoalphabetic cipher." Justify this statement. (c) Various ap

Feasibility Studies Before deciding on strategy, all information of economic or non economic consequences of vulnerability of information asset should be explored. A number of w

UDP- DATAGRAM TRANSPORT SERVICE INTRODUCTION:  UDP is the one of the transport protocols in TCP/IP protocol suite. UDP protocol accepts applications on the computers to