Ip datagram,its transmission and frames, Computer Network Security

IP DATAGRAM

Various options can be included to IP header, e.g., source route, record route and timestamp. Header with no function has H. LEN field value 5; data starts immediately after DESTINATION IP ADDRESS. Options are included between DESTINATION IP ADDRESS and packet data in multiples of 32 bits.  Header with 96 bits of function has H. LEN field value 8.

 

DATAGRAM TRANSMISSION AND FRAMES:

 IP Internet layer has basic tasks: It creates datagram, calculates next hop and gives to network interface layer. Network interface layer has basic tasks: It related next hop address to hardware address and makes datagram for transmission. But hardware frame doesn't understand IP how datagram is send.

 

Posted Date: 8/1/2012 8:03:54 AM | Location : United States







Related Discussions:- Ip datagram,its transmission and frames, Assignment Help, Ask Question on Ip datagram,its transmission and frames, Get Answer, Expert's Help, Ip datagram,its transmission and frames Discussions

Write discussion on Ip datagram,its transmission and frames
Your posts are moderated
Related Questions

Unguided Media This is the wireless media that transfer electromagnetic waves without using a physical media. Waves are broadcast through the air. This is performing through r

Network security is an issue for companies regardless of whether they participate in electronic commerce; however, since most organizations have a Web site that allows some interac

QUESTION (a) Compare and contrast phishing and pharming attacks (b) Nowadays, web defacement may not always be visual (i) Explain web defacement (ii) What is the main

Question: a) Explain what you understand by the term brute force attack, giving an example of such an attack b) Briefly outline the concept of Caesar cipher and identify a

Scenario: A network with individual hosts (really, virtual machines) can run HTTP (web) servers that are available to the outside. (Here, available means the ability to read and wr

Question: (a) What is the major problem with public key encryption when compared to symmetric key encryption? (b) Consider the following protocol for communication between t

DIRECT INDEXING It is less usually known method. It is possible only is cases where protocols address are given from a compact range. In the diagram below an example of direct

ROUTING TABLES AND ADDRESS MASKS Additional information is saved in routing table. Destination is kept as network address. Next hop is saved as IP address of router. Address m

Probelm 1: Give the History and Evolution of Wireless Communication System. Complete explanation Probelm 2: Describe the process of Components Identification and cal