Length- transport layer, Computer Networking

Assignment Help:

Length

This is a 16 bit  field  that  defines  the total  length  of the user  datagram, header  plus data. This 16 bit  can define  a total  length  of a 0 to 65, 535 bytes. However the  total  length  needs  to be much  less  because  a UDP is stored in an IP datagram with a total  length  of 65, 535 bytes,

The  length  fields in a UDP user datagram is actually not  necessary. A user datagram  is encapsulated in an IP datagram. There is  a fields  in the IP datagram that defined the total  length. There is another  fields in the IP datagram  that defines  the length  the header. So  if we subtract the value of the second field from  the first  we can find the  length  of a UDP  Dataram that is  encapsulated in IP datagram.

UDP length = IP length - IP header s length

However the designers of the UDP protocols  felt  that it  was more efficient  for the  destination  UDP to calculate the length  of the data  from the  information  provided  in the  UDP user  datagram rather than ask the IP software to supply  this information. We should  remember  that when  the IP  software  delivers the UDP user datagram to the UDP layer. It has  already dropped  the IP header.


Related Discussions:- Length- transport layer

Security goals confidentiality- integrity- digital signature, Question 1   ...

Question 1   This question concerns the main security goals (confidentiality, integrity, availability). Describe a situation which provides the goal of confidentiality but does not

Simple mail transfer protocol ( smtp), Simple Mail Transfer Protocol ( SMTP...

Simple Mail Transfer Protocol ( SMTP) SMTP is the principal  application layer protocol for  internet electronic  mail. It uses the reliable data transfer  service of TCP  to

Describe the term - license-free operation, Describe the term - License-fre...

Describe the term - License-free operation Users would prefer to buy and operate wireless LAN products without having to secure a license for the frequency band used by the LAN

computer computinons, Difference between synchronous tdm and statistical t...

Difference between synchronous tdm and statistical tdm

Explain how a cdma system works, (a) Explain how a CDMA system works? (b...

(a) Explain how a CDMA system works? (b) Explain howWelsh-Hadamard codes are generated. Explain why orthogonality between different spreading codes is important. (c) Consider

Explain the diffrent types of security attacks, Q. Explain the diffrent typ...

Q. Explain the diffrent types of Security Attacks? Types of Security Attacks Passive Threats: - Traffic Analysis and - Release of Message Contents Active

Networking, Discuss the interdependence of networking hardware and software...

Discuss the interdependence of networking hardware and software. Is it possible to have one without the other?

Functions of the information security steering committee, Question: (a)...

Question: (a) Do you agree with the following statements (specify your reasons to support your answer for each):- i) Policies are the foundation for the development of sta

State the latest technology in the line of intranet, State the latest techn...

State the latest technology in the line of Intranet The latest technology in the line of Intranet tools has been the Web-based Distributed Authoring and Versioning (WebDAV), w

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd