Introduction and IPv4 Datagram Header - GeeksforGeeks

文章推薦指數: 80 %
投票人數:10人

IPv4 uses 32-bit (4 byte) addressing, which gives 232 addresses. IPv4 addresses are written in the dot-decimal notation, which comprises of four ... Skiptocontent TutorialsPracticeDS&Algo.MustDoQuestionsDSATopic-wiseDSACompany-wiseAlgorithmsAnalysisofAlgorithmsAsymptoticAnalysisWorst,AverageandBestCasesAsymptoticNotationsLittleoandlittleomeganotationsLowerandUpperBoundTheoryAnalysisofLoopsSolvingRecurrencesAmortizedAnalysisWhatdoes'SpaceComplexity'mean?Pseudo-polynomialAlgorithmsPolynomialTimeApproximationSchemeATimeComplexityQuestionSearchingAlgorithmsSortingAlgorithmsGraphAlgorithmsPatternSearchingGeometricAlgorithmsMathematicalBitwiseAlgorithmsRandomizedAlgorithmsGreedyAlgorithmsDynamicProgrammingDivideandConquerBacktrackingBranchandBoundAllAlgorithmsDataStructuresArraysLinkedListStackQueueBinaryTreeBinarySearchTreeHeapHashingGraphAdvancedDataStructureMatrixStringsAllDataStructuresInterviewCornerCompanyPreparationTopTopicsPracticeCompanyQuestionsInterviewExperiencesExperiencedInterviewsInternshipInterviewsCompetititveProgrammingDesignPatternsSystemDesignTutorialMultipleChoiceQuizzesLanguagesCC++JavaPythonC#JavaScriptjQuerySQLPHPScalaPerlGoLanguageHTMLCSSKotlinCSSubjectsMathematicsOperatingSystemDBMSComputerNetworksComputerOrganizationandArchitectureTheoryofComputationCompilerDesignDigitalLogicSoftwareEngineeringGATEGATEComputerScienceNotesLastMinuteNotesGATECSSolvedPapersGATECSOriginalPapersandOfficialKeysGATE2021DatesGATECS2021SyllabusImportantTopicsforGATECSWebTechnologiesHTMLCSSJavaScriptAngularJSReactJSNodeJSBootstrapjQueryPHPSoftwareDesignsSoftwareDesignPatternsSystemDesignTutorialSchoolLearningSchoolProgrammingMathematicsNumberSystemAlgebraTrigonometryStatisticsProbabilityGeometryMensurationCalculusMathsNotes(Class8-12)Class8NotesClass9NotesClass10NotesClass11NotesClass12NotesNCERTSolutionsClass8MathsSolutionClass9MathsSolutionClass10MathsSolutionClass11MathsSolutionClass12MathsSolutionRDSharmaSolutionsClass8MathsSolutionClass9MathsSolutionClass10MathsSolutionClass11MathsSolutionClass12MathsSolutionPhysicsNotes(Class8-11)Class8NotesClass9NotesClass10NotesClass11NotesCSExams/PSUsISROISROCSOriginalPapersandOfficialKeysISROCSSolvedPapersISROCSSyllabusforScientist/EngineerExamUGCNETUGCNETCSNotesPaperIIUGCNETCSNotesPaperIIIUGCNETCSSolvedPapersStudentCampusAmbassadorProgramSchoolAmbassadorProgramProjectGeekoftheMonthCampusGeekoftheMonthPlacementCourseCompetititveProgrammingTestimonialsGeekontheTopCareersInternshipJobsApplyforJobsPostaJobJOB-A-THONEventsCourses ComewritearticlesforusandgetfeaturedLearnandcodewiththebestindustryexpertsGetaccesstoad-freecontent,doubtassistanceandmore!ComeandfindyourdreamjobwithusGeeksDigestQuizzesGeeksCampusGblogArticlesIDECampusMantriHomeSavedVideosCoursesGBlogPuzzlesWhat'sNew? ChangeLanguage DataStructuresAlgorithmsInterviewPreparationTopic-wisePracticeC++JavaPythonCompetitiveProgrammingMachineLearningWebDevelopmentSDESheetPuzzlesGFGSchoolProjects RelatedArticles ▲RelatedArticlesComputerNetworkFundamentalsComputerNetworkTutorialsBasicsofComputerNetworkingGoalsofNetworksTypesofNetworkTopologyTypesofareanetworks–LAN,MANandWANIntroductionofMobileAdhocNetwork(MANET)TypesofMANETinComputerNetworkRedundantLinkproblemsinComputerNetworkDigitalSubscriberLine(DSL)WhatisScramblinginDigitalElectronics?DifferencebetweenUnipolar,PolarandBipolarLineCodingSchemesManchesterEncodinginComputerNetworkLet’sexperimentwithNetworkingLayersofOSIModelTCP/IPModelPhysicallayerNetworkDevices(Hub,Repeater,Bridge,Switch,Router,GatewaysandBrouter)TypesofTransmissionMediaTransmissionModesinComputerNetworks(Simplex,Half-DuplexandFull-Duplex)AnalogtoDigitalConversionDigitaltoAnalogConversionWirelessCommunication|Set1WirelessCommunication|Set2AnalogtoAnalogConversion(Modulation)DifferencebetweenBroadbandandBasebandTransmissionDesignIssuesinPhysicalLayerDataLinklayerMultipleAccessProtocolsinComputerNetworkP2P(PeerToPeer)FileSharingFraminginDataLinkLayerLANTechnologies|ETHERNETEthernetFrameFormatTokenRingframeformatBitStuffinginComputerNetworkDifferencebetweenBytestuffingandBitstuffingHammingCodeinComputerNetworkCarrierSenseMultipleAccess(CSMA)ControlledAccessProtocolsinComputerNetworkBack-offAlgorithmforCSMA/CDCollisionDetectioninCSMA/CDEfficiencyofCSMA/CDEfficiencyOfTokenRingErrorDetectioninComputerNetworksStopandWaitARQSlidingWindowProtocol|Set1(SenderSide)SlidingWindowProtocol|Set2(ReceiverSide)SlidingWindowProtocol|Set3(SelectiveRepeat)SlidingWindowprotocolsSummaryWithQuestionsProgramtoremotelyPowerOnaPCovertheinternetusingtheWake-on-LANprotocol.ProgramtocalculatetheRoundTripTime(RTT)IntroductionofMACAddressinComputerNetworkCollisionAvoidanceinwirelessnetworksMaximumDataRate(channelcapacity)forNoiselessandNoisychannelsTypesofswitchesinComputerNetworkNetworklayerIntroductionofInternetworkingLineConfigurationinComputerNetworksDifferencebetweenUnicast,BroadcastandMulticastinComputerNetworkCollisionDomainandBroadcastDomaininComputerNetworkIntroductionofClassfulIPAddressingIntroductionandIPv4DatagramHeaderIPv4DatagramFragmentationandDelaysFragmentationatNetworkLayerInternetProtocolversion6(IPv6)InternetProtocolversion6(IPv6)HeaderIPAddressing|ClasslessAddressingSupernettinginNetworkLayerLongestPrefixMatchinginRoutersProgramtodetermineclass,NetworkandHostIDofanIPv4addressCProgramtofindIPAddress,SubnetMask&DefaultGatewayIPv4ClasslessSubnetequationIntroductionofVariableLengthSubnetMask(VLSM)NetworkAddressTranslation(NAT)TypesofNetworkAddressTranslation(NAT)ClassificationofRoutingAlgorithmsTypesofRoutingClassesofRoutingProtocolsDifferencebetweenDistancevectorroutingandLinkStateroutingFixedandFloodingRoutingalgorithmsRoutingv/sRoutedProtocolsinComputerNetworkUnicastRouting–LinkStateRoutingDistanceVectorRouting(DVR)ProtocolRoutePoisoningandCounttoinfinityprobleminRoutingOnionRoutingConfigurationofRouteronastickInternetControlMessageProtocol(ICMP)HotStandbyRouterProtocol(HSRP)OpenShortestPathFirst(OSPF)ProtocolfundamentalsOpenShortestPathFirst(OSPF)protocolStatesOpenshortestpathfirst(OSPF)routerrolesandconfigurationRootBridgeElectioninSpanningTreeProtocolTypesofSpanningTreeProtocol(STP)EIGRPfundamentalsFeaturesofEnhancedInteriorGatewayRoutingProtocol(EIGRP)RoutingInformationProtocol(RIP)RoutingInformationProtocol(RIP)V1&V2LinkStateAdvertisement(LSA)AdministrativeDistance(AD)andAutonomousSystem(AS)CircuitSwitchinginComputerNetworkPacketSwitchingandDelaysinComputerNetworkDifferencesbetweenVirtualCircuitsandDatagramNetworksDifferencebetweenCircuitSwitchingandPacketSwitchingTracerouteinNetworkLayerHowAddressResolutionProtocol(ARP)works?ARP,ReverseARP(RARP),InverseARP(InARP),ProxyARPandGratuitousARPPacketflowinthesameNetworkPacketflowindifferentNetworkDifferencebetweenlayer-2andlayer-3switchesDifferencebetweenPingandTracerouteServersinComputerNetworkWhatisLocalHost?TransportlayerTransportLayerresponsibilitiesCongestionControlinComputerNetworksComputerNetwork|LeakybucketalgorithmServicesandSegmentstructureinTCPTCPCongestionControlTCP3-WayHandshakeProcessTCPConnectionEstablishmentTCPConnectionTerminationErrorControlinTCPTCPTimersTCPflagsTCPServer-ClientimplementationinCUserDatagramProtocol(UDP)DifferencesbetweenTCPandUDPMultiplexingandDemultiplexinginTransportLayerApplicationlayerProtocolsinApplicationLayerDomainNameSystem(DNS)inApplicationLayerAddressResolutioninDNS(DomainNameServer)DNSSpoofingorDNSCachepoisoningWhydoesDNSuseUDPandnotTCP?DynamicHostConfigurationProtocol(DHCP)DHCPRelayAgentinComputerNetworkHowDHCPserverdynamicallyassignsIPaddresstoahost?SimpleNetworkManagementProtocol(SNMP)SimpleMailTransferProtocol(SMTP)FileTransferProtocol(FTP)inApplicationLayerHTTPNon-Persistent&PersistentConnection|Set1MultipurposeInternetMailExtension(MIME)ProtocolDifferencebetweenhttp://andhttps://DifferencebetweenHTMLandHTTPWhat’sdifferencebetweenTheInternetandTheWeb?BasicsofWi-FiWifiprotectedsetup(WPS)Wifiprotectedaccess(WPA)DifferencebetweenLiFiandWiFiNetworkSecurityBasicNetworkAttacksinComputerNetworkTypesofVirusesIntroductionofFirewallinComputerNetworkZone-basedfirewallFirewallmethodologiesDenialofServiceandPreventionIntroductiontoCrypto-terminologiesDenialofServiceDDoSattackTypesofDNSAttacksandTacticsforSecurityActiveandPassiveattacksinInformationSecurityBirthdayattackinCryptographyDigitalSignaturesandCertificatesLZW(Lempel–Ziv–Welch)CompressiontechniqueRC4EncryptionAlgorithmRC5EncryptionAlgorithmSHA-512HashInJavaRSAAlgorithminCryptographyRSAAlgorithmusingMultiplePrecisionArithmeticLibraryWeakRSAdecryptionwithChinese-remaindertheoremImplementationofDiffie-HellmanAlgorithmDNACryptographyPortSecurityinComputerNetworkUnicodeinComputerNetworkMessageAuthenticationCodesHowmessageauthenticationcodeworks?SystemSecurityHashFunctionsinSystemSecurityTheCIAtriadinCryptographyImageSteganographyinCryptographyAccess-Lists(ACL)Dataencryptionstandard(DES)|Set1DifferencebetweenAESandDESciphersComputerNetworkQuizesComputerNetworks|Set1ComputerNetworks|Set2ComputerNetworks|Set3ComputerNetworks|Set4ComputerNetworks|Set5ComputerNetworks|Set6ComputerNetworks|Set7ComputerNetworks|Set8ComputerNetworks|Set9ComputerNetworks|Set10ComputerNetworkGATEQuestionsMiscTopicsinComputerNetworksCNDataLinkLayerNetworkLayerIPAddressingTransportLayerHTTPNon-Persistent&PersistentConnection|Set2(PracticeQuestion)ApplicationLayerNetworkSecurityTableofContentsComputerNetworkFundamentalsComputerNetworkTutorialsBasicsofComputerNetworkingGoalsofNetworksTypesofNetworkTopologyTypesofareanetworks–LAN,MANandWANIntroductionofMobileAdhocNetwork(MANET)TypesofMANETinComputerNetworkRedundantLinkproblemsinComputerNetworkDigitalSubscriberLine(DSL)WhatisScramblinginDigitalElectronics?DifferencebetweenUnipolar,PolarandBipolarLineCodingSchemesManchesterEncodinginComputerNetworkLet’sexperimentwithNetworkingLayersofOSIModelTCP/IPModelPhysicallayerNetworkDevices(Hub,Repeater,Bridge,Switch,Router,GatewaysandBrouter)TypesofTransmissionMediaTransmissionModesinComputerNetworks(Simplex,Half-DuplexandFull-Duplex)AnalogtoDigitalConversionDigitaltoAnalogConversionWirelessCommunication|Set1WirelessCommunication|Set2AnalogtoAnalogConversion(Modulation)DifferencebetweenBroadbandandBasebandTransmissionDesignIssuesinPhysicalLayerDataLinklayerMultipleAccessProtocolsinComputerNetworkP2P(PeerToPeer)FileSharingFraminginDataLinkLayerLANTechnologies|ETHERNETEthernetFrameFormatTokenRingframeformatBitStuffinginComputerNetworkDifferencebetweenBytestuffingandBitstuffingHammingCodeinComputerNetworkCarrierSenseMultipleAccess(CSMA)ControlledAccessProtocolsinComputerNetworkBack-offAlgorithmforCSMA/CDCollisionDetectioninCSMA/CDEfficiencyofCSMA/CDEfficiencyOfTokenRingErrorDetectioninComputerNetworksStopandWaitARQSlidingWindowProtocol|Set1(SenderSide)SlidingWindowProtocol|Set2(ReceiverSide)SlidingWindowProtocol|Set3(SelectiveRepeat)SlidingWindowprotocolsSummaryWithQuestionsProgramtoremotelyPowerOnaPCovertheinternetusingtheWake-on-LANprotocol.ProgramtocalculatetheRoundTripTime(RTT)IntroductionofMACAddressinComputerNetworkCollisionAvoidanceinwirelessnetworksMaximumDataRate(channelcapacity)forNoiselessandNoisychannelsTypesofswitchesinComputerNetworkNetworklayerIntroductionofInternetworkingLineConfigurationinComputerNetworksDifferencebetweenUnicast,BroadcastandMulticastinComputerNetworkCollisionDomainandBroadcastDomaininComputerNetworkIntroductionofClassfulIPAddressingIntroductionandIPv4DatagramHeaderIPv4DatagramFragmentationandDelaysFragmentationatNetworkLayerInternetProtocolversion6(IPv6)InternetProtocolversion6(IPv6)HeaderIPAddressing|ClasslessAddressingSupernettinginNetworkLayerLongestPrefixMatchinginRoutersProgramtodetermineclass,NetworkandHostIDofanIPv4addressCProgramtofindIPAddress,SubnetMask&DefaultGatewayIPv4ClasslessSubnetequationIntroductionofVariableLengthSubnetMask(VLSM)NetworkAddressTranslation(NAT)TypesofNetworkAddressTranslation(NAT)ClassificationofRoutingAlgorithmsTypesofRoutingClassesofRoutingProtocolsDifferencebetweenDistancevectorroutingandLinkStateroutingFixedandFloodingRoutingalgorithmsRoutingv/sRoutedProtocolsinComputerNetworkUnicastRouting–LinkStateRoutingDistanceVectorRouting(DVR)ProtocolRoutePoisoningandCounttoinfinityprobleminRoutingOnionRoutingConfigurationofRouteronastickInternetControlMessageProtocol(ICMP)HotStandbyRouterProtocol(HSRP)OpenShortestPathFirst(OSPF)ProtocolfundamentalsOpenShortestPathFirst(OSPF)protocolStatesOpenshortestpathfirst(OSPF)routerrolesandconfigurationRootBridgeElectioninSpanningTreeProtocolTypesofSpanningTreeProtocol(STP)EIGRPfundamentalsFeaturesofEnhancedInteriorGatewayRoutingProtocol(EIGRP)RoutingInformationProtocol(RIP)RoutingInformationProtocol(RIP)V1&V2LinkStateAdvertisement(LSA)AdministrativeDistance(AD)andAutonomousSystem(AS)CircuitSwitchinginComputerNetworkPacketSwitchingandDelaysinComputerNetworkDifferencesbetweenVirtualCircuitsandDatagramNetworksDifferencebetweenCircuitSwitchingandPacketSwitchingTracerouteinNetworkLayerHowAddressResolutionProtocol(ARP)works?ARP,ReverseARP(RARP),InverseARP(InARP),ProxyARPandGratuitousARPPacketflowinthesameNetworkPacketflowindifferentNetworkDifferencebetweenlayer-2andlayer-3switchesDifferencebetweenPingandTracerouteServersinComputerNetworkWhatisLocalHost?TransportlayerTransportLayerresponsibilitiesCongestionControlinComputerNetworksComputerNetwork|LeakybucketalgorithmServicesandSegmentstructureinTCPTCPCongestionControlTCP3-WayHandshakeProcessTCPConnectionEstablishmentTCPConnectionTerminationErrorControlinTCPTCPTimersTCPflagsTCPServer-ClientimplementationinCUserDatagramProtocol(UDP)DifferencesbetweenTCPandUDPMultiplexingandDemultiplexinginTransportLayerApplicationlayerProtocolsinApplicationLayerDomainNameSystem(DNS)inApplicationLayerAddressResolutioninDNS(DomainNameServer)DNSSpoofingorDNSCachepoisoningWhydoesDNSuseUDPandnotTCP?DynamicHostConfigurationProtocol(DHCP)DHCPRelayAgentinComputerNetworkHowDHCPserverdynamicallyassignsIPaddresstoahost?SimpleNetworkManagementProtocol(SNMP)SimpleMailTransferProtocol(SMTP)FileTransferProtocol(FTP)inApplicationLayerHTTPNon-Persistent&PersistentConnection|Set1MultipurposeInternetMailExtension(MIME)ProtocolDifferencebetweenhttp://andhttps://DifferencebetweenHTMLandHTTPWhat’sdifferencebetweenTheInternetandTheWeb?BasicsofWi-FiWifiprotectedsetup(WPS)Wifiprotectedaccess(WPA)DifferencebetweenLiFiandWiFiNetworkSecurityBasicNetworkAttacksinComputerNetworkTypesofVirusesIntroductionofFirewallinComputerNetworkZone-basedfirewallFirewallmethodologiesDenialofServiceandPreventionIntroductiontoCrypto-terminologiesDenialofServiceDDoSattackTypesofDNSAttacksandTacticsforSecurityActiveandPassiveattacksinInformationSecurityBirthdayattackinCryptographyDigitalSignaturesandCertificatesLZW(Lempel–Ziv–Welch)CompressiontechniqueRC4EncryptionAlgorithmRC5EncryptionAlgorithmSHA-512HashInJavaRSAAlgorithminCryptographyRSAAlgorithmusingMultiplePrecisionArithmeticLibraryWeakRSAdecryptionwithChinese-remaindertheoremImplementationofDiffie-HellmanAlgorithmDNACryptographyPortSecurityinComputerNetworkUnicodeinComputerNetworkMessageAuthenticationCodesHowmessageauthenticationcodeworks?SystemSecurityHashFunctionsinSystemSecurityTheCIAtriadinCryptographyImageSteganographyinCryptographyAccess-Lists(ACL)Dataencryptionstandard(DES)|Set1DifferencebetweenAESandDESciphersComputerNetworkQuizesComputerNetworks|Set1ComputerNetworks|Set2ComputerNetworks|Set3ComputerNetworks|Set4ComputerNetworks|Set5ComputerNetworks|Set6ComputerNetworks|Set7ComputerNetworks|Set8ComputerNetworks|Set9ComputerNetworks|Set10ComputerNetworkGATEQuestionsMiscTopicsinComputerNetworksCNDataLinkLayerNetworkLayerIPAddressingTransportLayerHTTPNon-Persistent&PersistentConnection|Set2(PracticeQuestion)ApplicationLayerNetworkSecurityImproveArticle SaveArticle LikeArticle IntroductionandIPv4DatagramHeaderDifficultyLevel: MediumLastUpdated: 28Jun,2021Thenetworklayeristhethirdlayer(frombottom)intheOSIModel.Thenetworklayerisconcernedwiththedeliveryofapacketacrossmultiplenetworks.ThenetworklayerisconsideredthebackboneoftheOSIModel.Itselectsandmanagesthebestlogicalpathfordatatransferbetweennodes.Thislayercontainshardwaredevicessuchasrouters,bridges,firewalls,andswitches,butitactuallycreatesalogicalimageofthemostefficientcommunicationrouteandimplementsitwithaphysicalmedium.Networklayerprotocolsexistineveryhostorrouter.TherouterexaminestheheaderfieldsofalltheIPpacketsthatpassthroughit.InternetProtocolandNetwareIPX/SPXarethemostcommonprotocolsassociatedwiththenetworklayer.IntheOSImodel,thenetworklayerrespondstorequestsfromthelayeraboveit(transportlayer)andissuesrequeststothelayerbelowit(datalinklayer).ResponsibilitiesofNetworkLayer:Packetforwarding/Routingofpackets:RelayingofdatapacketsfromonenetworksegmenttoanotherbynodesinacomputernetworkConnectionlesscommunication(IP):Adatatransmissionmethodusedinpacket-switchednetworksinwhicheachdataunitisseparatelyaddressedandroutedbasedoninformationcarriedbyitFragmentationofdatapackets:SplittingofdatapacketsthataretoolargetobetransmittedonthenetworkTherearetwotypesofnetworktransmissiontechniques,circuitswitchednetworkandpacketswitchednetwork.CircuitSwitchvsPacketSwitchIncircuitswitchednetwork,asinglepathisdesignatedfortransmissionofallthedatapackets.Whereasincaseofapacket-switchednetwork,eachpacketmaybesentthroughadifferentpathtoreachthedestination.Inacircuitswitchednetwork,thedatapacketsarereceivedinorderwhereasinapacketswitchednetwork,thedatapacketsmaybereceivedoutoforder.ThepacketswitchingisfurthersubdividedintoVirtualcircuitsandDatagram.IPv4:IPv4isaconnectionlessprotocolusedforpacket-switchednetworks.Itoperatesonabesteffortdeliverymodel,inwhichneitherdeliveryisguaranteed,norpropersequencingoravoidanceofduplicatedeliveryisassured.InternetProtocolVersion4(IPv4)isthefourthrevisionoftheInternetProtocolandawidelyusedprotocolindatacommunicationoverdifferentkindsofnetworks.IPv4isaconnectionlessprotocolusedinpacket-switchedlayernetworks,suchasEthernet.Itprovidesalogicalconnectionbetweennetworkdevicesbyprovidingidentificationforeachdevice.TherearemanywaystoconfigureIPv4withallkindsofdevices–includingmanualandautomaticconfigurations–dependingonthenetworktype.IPv4isdefinedandspecifiedinIETFpublicationRFC791.IPv4uses32-bitaddressesforEthernetcommunicationinfiveclasses:A,B,C,DandE.ClassesA,BandChaveadifferentbitlengthforaddressingthenetworkhost.ClassDaddressesarereservedformilitarypurposes,whileclassEaddressesarereservedforfutureuse.IPv4uses32-bit(4byte)addressing,whichgives232addresses.IPv4addressesarewritteninthedot-decimalnotation,whichcomprisesoffouroctetsoftheaddressexpressedindividuallyindecimalandseparatedbyperiods,forinstance,192.168.1.5.IPv4DatagramHeaderSizeoftheheaderis20to60bytes.VERSION:VersionoftheIPprotocol(4bits),whichis4forIPv4HLEN:IPheaderlength(4bits),whichisthenumberof32bitwordsintheheader.Theminimumvalueforthisfieldis5andthemaximumis15.Typeofservice:LowDelay,HighThroughput,Reliability(8bits)TotalLength:Lengthofheader+Data(16bits),whichhasaminimumvalue20bytesandthemaximumis65,535bytes.Identification:UniquePacketIdforidentifyingthegroupoffragmentsofasingleIPdatagram(16bits)Flags:3flagsof1biteach:reservedbit(mustbezero),donotfragmentflag,morefragmentsflag(sameorder)FragmentOffset:RepresentsthenumberofDataBytesaheadoftheparticularfragmentintheparticularDatagram.Specifiedintermsofnumberof8bytes,whichhasthemaximumvalueof65,528bytes.Timetolive:Datagram’slifetime(8bits),ItpreventsthedatagramtoloopthroughthenetworkbyrestrictingthenumberofHopstakenbyaPacketbeforedeliveringtotheDestination.Protocol:Nameoftheprotocoltowhichthedataistobepassed(8bits)HeaderChecksum:16bitsheaderchecksumforcheckingerrorsinthedatagramheaderSourceIPaddress:32bitsIPaddressofthesenderDestinationIPaddress:32bitsIPaddressofthereceiverOption:Optionalinformationsuchassourceroute,recordroute.UsedbytheNetworkadministratortocheckwhetherapathisworkingornot.Duetothepresenceofoptions,thesizeofthedatagramheadercanbeofvariablelength(20bytesto60bytes).BelowquestionshavebeenaskedinpreviousGATEexamonabovetopics.GATE|GATECS2006|Question 5GATE|GATE-CS-2010|Question 15GATE|GATE-CS-2014Set3|Question 35GATE|GATECS2015Set1|Question 65Pleasewritecommentsifyoufindanythingincorrect,oryouwanttosharemoreinformationaboutthetopicdiscussedabove.MyPersonalNotes arrow_drop_upSave LikePreviousIntroductionofClassfulIPAddressingNext IPv4DatagramFragmentationandDelaysRecommendedArticlesPage:06,Jul1504,Mar2211,Dec1628,Sep1714,Apr2010,Jun2101,Jun2105,Nov1820,Aug2128,May1705,Sep1810,May1905,May2001,Mar2121,Sep1720,May2020,May2001,Mar2105,Mar2227,Mar1801,Sep2131,Aug1709,Oct1708,Mar18ArticleContributedBy:GeeksforGeeksVotefordifficultyCurrentdifficulty: MediumEasy Normal Medium Hard ExpertImprovedBy:Sayantan20anonymous007ArticleTags:NetworkLayerComputerNetworksPracticeTags:ComputerNetworksReportIssueWritingcodeincomment? Pleaseuseide.geeksforgeeks.org, generatelinkandsharethelinkhere. LoadCommentsWhat'sNewViewDetailsViewDetailsViewDetailsMostpopularinComputerNetworksCaesarCipherinCryptographySocketProgramminginPythonUDPServer-ClientimplementationinCSocketProgramminginJavaSimpleChatRoomusingPythonMorerelatedarticlesinComputerNetworksDifferencesbetweenIPv4andIPv6AdvancedEncryptionStandard(AES)nslookupcommandinLinuxwithExamplesDifferencebetweenLAN,MANandWANIntrusionDetectionSystem(IDS)× Weusecookiestoensureyouhavethebestbrowsingexperienceonourwebsite.Byusingoursite,you acknowledgethatyouhavereadandunderstoodour CookiePolicy& PrivacyPolicy GotIt! StartYourCodingJourneyNow!Login Register



請為這篇文章評分?