Length- transport layer, Computer Networking

Length

This is a 16 bit  field  that  defines  the total  length  of the user  datagram, header  plus data. This 16 bit  can define  a total  length  of a 0 to 65, 535 bytes. However the  total  length  needs  to be much  less  because  a UDP is stored in an IP datagram with a total  length  of 65, 535 bytes,

The  length  fields in a UDP user datagram is actually not  necessary. A user datagram  is encapsulated in an IP datagram. There is  a fields  in the IP datagram that defined the total  length. There is another  fields in the IP datagram  that defines  the length  the header. So  if we subtract the value of the second field from  the first  we can find the  length  of a UDP  Dataram that is  encapsulated in IP datagram.

UDP length = IP length - IP header s length

However the designers of the UDP protocols  felt  that it  was more efficient  for the  destination  UDP to calculate the length  of the data  from the  information  provided  in the  UDP user  datagram rather than ask the IP software to supply  this information. We should  remember  that when  the IP  software  delivers the UDP user datagram to the UDP layer. It has  already dropped  the IP header.

Posted Date: 3/11/2013 5:48:57 AM | Location : United States







Related Discussions:- Length- transport layer, Assignment Help, Ask Question on Length- transport layer, Get Answer, Expert's Help, Length- transport layer Discussions

Write discussion on Length- transport layer
Your posts are moderated
Related Questions

What is backbone network? A backbone network is a centralized infrastructure that is intended to distribute dissimilar routes and data to various networks. It also handles mana

In IPSec what is SAD, SPD and SA's?


Distribution of DNS 1.By centralized data base The information contained in the domain  name space must be stored. A simple design  or DNS would have one DNS server that co

PVM uses two environment variables when starting and running. Every PVM user needs to set these two variables to use PVM. The initial variable is PVM_ROOT, which is set to the loca

You must write the 6 programs described below. All of these are command-line tools that follow the Unix style of passing switches and arguments on the command line. As such, your p

Protocol Layers and their Service Models The  internet is an extremely complicated system. It  consists of many  pieces like  numerous  applications and protocols  various  t

Disadvantages You typically  would  not use a packet filter  as your  only security solution for your network  packets filters have two  major  disadvantages. a. Low securit

Define Encoder? A device or program that uses predefined algorithms to encode, or compress audio or video data for storage or transmission use. A circuit that is used to change