Length- transport layer, Computer Networking

Length

This is a 16 bit  field  that  defines  the total  length  of the user  datagram, header  plus data. This 16 bit  can define  a total  length  of a 0 to 65, 535 bytes. However the  total  length  needs  to be much  less  because  a UDP is stored in an IP datagram with a total  length  of 65, 535 bytes,

The  length  fields in a UDP user datagram is actually not  necessary. A user datagram  is encapsulated in an IP datagram. There is  a fields  in the IP datagram that defined the total  length. There is another  fields in the IP datagram  that defines  the length  the header. So  if we subtract the value of the second field from  the first  we can find the  length  of a UDP  Dataram that is  encapsulated in IP datagram.

UDP length = IP length - IP header s length

However the designers of the UDP protocols  felt  that it  was more efficient  for the  destination  UDP to calculate the length  of the data  from the  information  provided  in the  UDP user  datagram rather than ask the IP software to supply  this information. We should  remember  that when  the IP  software  delivers the UDP user datagram to the UDP layer. It has  already dropped  the IP header.

Posted Date: 3/11/2013 5:48:57 AM | Location : United States







Related Discussions:- Length- transport layer, Assignment Help, Ask Question on Length- transport layer, Get Answer, Expert's Help, Length- transport layer Discussions

Write discussion on Length- transport layer
Your posts are moderated
Related Questions
Question: (a) What is a script kiddie? Is it a significant security threat, and why? (b) Assume that UNIX uses the user login name in lieu of the traditional salt, what is

A Comparative Study between MPLS VPN and the Public Internet which has intro. operation of tecnology, analysis, discussion, recommendation, conclusion.

Q. Show the Importance of Security? The Internet presents enormous business opportunities. The Internet is open to public, vulnerable to various attacks. One of the major

Design a Logical LAN Topology Step: Design an IP addressing scheme. Given the IP address block of 192.168.7.0 /24, design an IP addressing scheme that states the following r

THICK ETHERNET WIRING:  It needs thick coax cable. AUI cable joins from NIC to transceiver. AUI cable take digital signal from NIC to transceiver. The transceiver creates anal

Define in details about computer networks ? Discuss a variety of types of networks topologies in computer network. Also discuss a variety of costs and disadvantage of all topology

Quetion: A 22 nF capacitor is initially charged to 10V. It is then discharged by connecting a 100kW resistor across it. Approximately how long does it take for the voltage on t

The Transport layer implements reliable data transport services. The various functions of Transport Layer are listed below The transport layer is meant for transmitting the data

Q. Explain the types of Security Threats? (a) Normal Flow (b) Interruption: An asset of a system develops into unavailable or unusable. (c) Interception: A few unaut

DNS spoofing This process is generally refers to the process of responding a DNS request that was supposed to implement for another server. This can be in the case where the s