Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Length
This is a 16 bit field that defines the total length of the user datagram, header plus data. This 16 bit can define a total length of a 0 to 65, 535 bytes. However the total length needs to be much less because a UDP is stored in an IP datagram with a total length of 65, 535 bytes,
The length fields in a UDP user datagram is actually not necessary. A user datagram is encapsulated in an IP datagram. There is a fields in the IP datagram that defined the total length. There is another fields in the IP datagram that defines the length the header. So if we subtract the value of the second field from the first we can find the length of a UDP Dataram that is encapsulated in IP datagram.
UDP length = IP length - IP header s length
However the designers of the UDP protocols felt that it was more efficient for the destination UDP to calculate the length of the data from the information provided in the UDP user datagram rather than ask the IP software to supply this information. We should remember that when the IP software delivers the UDP user datagram to the UDP layer. It has already dropped the IP header.
What is routing region? When hierarchical routing is used, the routers are separated into what we call regions, with each router knowing all the details about how to route pack
Explain about the Browser A program that allows the user to access and read information on the World Wide Web. Netscape® Navigator and Microsoft Explorer® are the best known
what is logical ring maintenance and how does it work>?
On which languages Intranet works Language Support The Intranet works on the basis of scripts written in any of the following languages, viz., SGML, HTML, DHTML, XML, AS
Operating system for Server Since 1994, when the original pair of web servers - NCSA HTTPd and CERN HTTPd , were proposed, dozens of commercial and shareware programs have
What is a Counter A software code that indicates how many times a site has been visited. It gets automatically updated and is usually represented by a small rectangle with n
State the uses of groupware With the use of groupware, users can easily do most of the office related management work, which otherwise would be extremely difficult. For instanc
Uneven Load Distribution In the parallel computer, the problem is dividing into sub-problems and is assigned for computation to various processors. But sometimes the sub-probl
What are the main features of TCP connections? Why is it said that TCP provides full-duplex service?
Question 1 Explain FDM and TDM with example Question 2 Define B-ISDN and explain its services Question 3 What is symmetric key cryptography? Describe one symmetric
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd