Example of record route ip option, Computer Networking

Assignment Help:

1. Suppose the datagram source allocates 12 bytes for this option. Then when the datagram leaves the source host, the RR option area will be like this:

7 12 4 0
0 0 0 0
0 0 0 0

2. At the ?rst router, the datagram may or may not be fragmented. The ?rst fragment (or the original datagram itself, if it was not fragmented) will be like this:
7 12 8 0
address 1
0 0 0 0

where "address1" is the IP address of the outgoing link at the router.

3. At the second router, the ?rst fragment (or original datagram) will be like this:
7 12 12 0
address 1
address 2

4. At the third and all later routers (which don't exist in this assignment), no additional IP addresses would be recorded because there is no room. These later routers can tell there is no room because the "pointer" value (12) is equal to the available space value.

 


Related Discussions:- Example of record route ip option

Explain the routing table of solaris system, Question 1 Write a note on a)...

Question 1 Write a note on a) Internet layer b) strict source routing Question 2 Explain the routing table of Solaris system Question 3 Explain following concepts a) MIM

Design a network security policy, SSK Software Corporation has opened an of...

SSK Software Corporation has opened an office in Toledo, Ohio. The office will have a wireless Wi-Fi (WLAN), and a Corporate wired Ethernet LAN. Workstation requirements are as

Difference between the communication and transmission, Communication is the...

Communication is the process of sending and receiving data by means of a data cable that is associated externally. Transmission means the transmitting of data from the source to

What are general middleware, What are General Middleware? It contains t...

What are General Middleware? It contains the communication stacks, authentication services, distributed directories, network time, RPC, Queuing services with the network OS ext

State the example of intranet security, State the example of intranet secur...

State the example of intranet security Imagine a situation when a company develops a major new product secretly using its Intranet. Hackers break the security and take away all

Prompt ''router'', Recognize the mode reflected by the following prompt 'Ro...

Recognize the mode reflected by the following prompt 'Router '? Ans) RXBoot

What is the terminal emulation, What is the Terminal Emulation, in which la...

What is the Terminal Emulation, in which layer it comes? Ans) The use of software, installed on PC or LAN server, that permits the PC to function as if it were dumb terminal dir

Name the protocol responsible for finding the mac address , a)  What does t...

a)  What does the "CD" mean in the CSMA/CD? How is it implemented in the Ethernet?   b)  Consider an Ethernet hub with 8 ports and an Ethernet switch with 8 ports. In both cases

Reference models - fundamentals of networks, Reference models Design...

Reference models Designing  implementing and  manufacturing  computer  networks  and related  devices  are very  complex  activities. Therefore in order  for this  technolog

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd