Record route ip option, Computer Networking

The address recorded by a router should be its outgoing interface. That is, if a router forwards a datagram that has the record route option enabled, and if the datagram arrives at the router via an interface with IP address X and leaves via an interface with IP address Y, Y should be recorded.

The format of the option is the following:

1. The ?rst byte of the option will have binary value 0000 0111. The ?rst bit indicates that the option should be copied into ONLY the ?rst fragment and NOT into any fragments after the ?rst. The next 2 bits indicate that this option is in "class 0" (i.e., a "control" option). The last 5 bits indicate that this is option 7 within class 0 (i.e., record route).

2. The second byte indicates the total number of bytes allocated in the option portion of the IP header.

3. The third byte is a "pointer." Its value indicates the next byte within the allotted space at which the next router IP address can begin. The pointer value is relative to the beginning of the option, which is considered to be byte 0. The initial value of this pointer must be 4.

4. All others bytes have value 0 until they are overwritten.

Posted Date: 3/15/2013 1:02:34 AM | Location : United States







Related Discussions:- Record route ip option, Assignment Help, Ask Question on Record route ip option, Get Answer, Expert's Help, Record route ip option Discussions

Write discussion on Record route ip option
Your posts are moderated
Related Questions
Q. Explain the diffrent types of Security Attacks? Types of Security Attacks Passive Threats: - Traffic Analysis and - Release of Message Contents Active

What is logical link control? One of two sublayers of the data link layer of OSI reference model, as explained by the IEEE 802 standard. This sublayer is responsible for mainta

802.11a OFDM a) Orthogonal frequency-division multiplexing utilizing a 5-GHz band b) Same as FDM except all sub bands are used by only one source at a given time c)  Secu

Describe the term Disaster Management as security threats Making and testing backups regularly could be the simplest and easiest of all the security measures. But a new questio

Coaxial Cable Coaxial  cable  carries signals  of higher  frequency ranges than those in twisted pair cable. In part  because the two media are constructed quite  differently.

What is Groupware Groupware are a collection of software tools that encompass a broad range of applications. Even though groupware broadly consists of applications like calend

What are short, long and medium-term scheduling? Long term scheduler verifies which programs are admitted to the system for processing. It controls the degree of multiprogrammi

In the following section, we shall discuss the algorithms for solving the matrix multiplication difficulty using the parallel models. Matrix Multiplication Problem Let ther

Hosts are generally, individual machines at a specific location. Normally Resources of host machine are shared and can be used by any user on Internet. Hosts & local networks are g

Distributed Shared Memory (DSM) systems copy a shared memory abstraction on loosely coupled architectures in order to allow shared memory programming despite missing hardware suppo