Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Length
This is a 16 bit field that defines the total length of the user datagram, header plus data. This 16 bit can define a total length of a 0 to 65, 535 bytes. However the total length needs to be much less because a UDP is stored in an IP datagram with a total length of 65, 535 bytes,
The length fields in a UDP user datagram is actually not necessary. A user datagram is encapsulated in an IP datagram. There is a fields in the IP datagram that defined the total length. There is another fields in the IP datagram that defines the length the header. So if we subtract the value of the second field from the first we can find the length of a UDP Dataram that is encapsulated in IP datagram.
UDP length = IP length - IP header s length
However the designers of the UDP protocols felt that it was more efficient for the destination UDP to calculate the length of the data from the information provided in the UDP user datagram rather than ask the IP software to supply this information. We should remember that when the IP software delivers the UDP user datagram to the UDP layer. It has already dropped the IP header.
Q. Show the Parity Check - Performance? Parity Check - Performance Is able to detect all single-bit errors Can as well detect burst errors if the total number of
Distribution of DNS 1.By centralized data base The information contained in the domain name space must be stored. A simple design or DNS would have one DNS server that co
What do you mean by Protocol? In the context of data networking, a protocol is a formal set of rules and conventions that governs how computers exchange information over a netw
I''m having trouble with understanding a diagram for my assignment
What are the data units at dissimilar layers of the TCP / IP protocol suite? The data unit formed at the application layer is called a message, at the transport layer the data
Explain use of perimeter area?
What is redirector? Redirector is software that intercepts file or prints I/O requests and changes them into network requests. This comes under presentation layer.
What is the purpose of cables being shielded and having twisted pairs? The main purpose of this is to stop crosstalk. Crosstalks are electromagnetic interferences or noise that
Name the three ways or wireless data to be propagated.
WAN interface card(WIC) slots Two fixed WIC slots are present in 2600 series router except 2691. It has contained 3 WIC slots. Network Module Expansion Slot( NM) slot
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd