Length- transport layer, Computer Networking

Assignment Help:

Length

This is a 16 bit  field  that  defines  the total  length  of the user  datagram, header  plus data. This 16 bit  can define  a total  length  of a 0 to 65, 535 bytes. However the  total  length  needs  to be much  less  because  a UDP is stored in an IP datagram with a total  length  of 65, 535 bytes,

The  length  fields in a UDP user datagram is actually not  necessary. A user datagram  is encapsulated in an IP datagram. There is  a fields  in the IP datagram that defined the total  length. There is another  fields in the IP datagram  that defines  the length  the header. So  if we subtract the value of the second field from  the first  we can find the  length  of a UDP  Dataram that is  encapsulated in IP datagram.

UDP length = IP length - IP header s length

However the designers of the UDP protocols  felt  that it  was more efficient  for the  destination  UDP to calculate the length  of the data  from the  information  provided  in the  UDP user  datagram rather than ask the IP software to supply  this information. We should  remember  that when  the IP  software  delivers the UDP user datagram to the UDP layer. It has  already dropped  the IP header.


Related Discussions:- Length- transport layer

Intranet, Intranets are fundamentally "small" Internets. They employ the sa...

Intranets are fundamentally "small" Internets. They employ the same network facilities which the Internet does, however access is limited to a restricted sphere. For example, a com

Networking device, what is the best time to use brouter rather than router?...

what is the best time to use brouter rather than router? what are advantages of using brouter over router?

Mobile interent technology, Question 3:4 By experimentation, work out the l...

Question 3:4 By experimentation, work out the lowest SNR, under which 4 users can si- multaneously communicate, without error, via this system. For SNR, simply report the largest v

Disk encryption and block cipher, Suppose AES (or any block cipher) is used...

Suppose AES (or any block cipher) is used to encrypt data. Which mode of encryption covered in class is best suited for each of the following two scenarios and why? If more than on

Explain the three principles of data communication system, Question 1 Vide...

Question 1 Videoconferencing is used to conduct meetings with the people who are located in far distance. Videoconferencing is an example of which type of computer networks? Expla

Determine the method to protect the web servers, Determine the method to pr...

Determine the method to protect the Web servers The company should install additional levels of security measures since it is possible for hackers to generate and send data wit

Why congestion occurs, Q. Why congestion occurs? Congestion Emerg...

Q. Why congestion occurs? Congestion Emerge if the load on the network is greater than the capacity of the network - Load that is the number of packets sent to the net

Explain short term and medium-term scheduling, What are short, long and med...

What are short, long and medium-term scheduling? Long term scheduler verifies which programs are admitted to the system for processing. It controls the degree of multiprogrammi

Compute shortest path, Compute the shortest path from t to all network node...

Compute the shortest path from t to all network nodes.

Explain the get and set snmp operations, Question 1 Explain the basic comm...

Question 1 Explain the basic communication model with its block diagram Question 2 List and explain the functions of network monitoring Question 3 Explain the get and se

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd