Describe header fields present in a udp segment, Computer Network Security

Assignment Help:

Question

(a) In relation to a TCP segment structure, provide the fields responsible for:

i. Connection Management
ii. Flow Control
iii. Error Control
iv. Reliable, in-order delivery.

(b) Explain the four header fields present in a UDP segment.

(c) Each host on the Internet is currently assigned an IP address 32 bits long (Ipv4). Ipv4 addresses are generally written as a series of four decimal numbers. IPv4 addresses traditionally belong to one of five classes of address, depending on the type of network.

i. Give the address range for a Class B network.
ii. What are Class D network addresses primarily used for?
iii. Will two hosts A and B with addresses 192.168.27.27 and 192.168.27.37 respectively communicate directly with each other if they share a subnet mask of 255.255.255.240?
iv. Explain one short-term technique which has been used to solve the shortage of Ipv4 addresses.
v. Give basic differences between IPv4 and IPv6.

(d) A datagram of 3200 bytes has to travel over a network with a MTU size of 1500 bytes. Describe how fragmentation will be used to solve this problem. You should provide the value of the 3 key fields used in fragmentation for each fragment created.


Related Discussions:- Describe header fields present in a udp segment

Wan architecture and wan service, MegaCorp INC. is a large manufacturing f...

MegaCorp INC. is a large manufacturing firm that operates 5 factories in Dallas, 4  factories in Los Angeles, and 5 factories in Albany, New York.  It operates a tightly  connected

Describe phishing attacks, QUESTION (a) (i) Describe Phishing attacks. ...

QUESTION (a) (i) Describe Phishing attacks. (ii) Distinguish between Phishing and Spear Phishing attacks. (b) Describe two instances where an attacker sniffing on a netwo

Ip datagram header format, IP DATAGRAM HEADER FORMAT:  It is given in...

IP DATAGRAM HEADER FORMAT:  It is given in the figure below:   In the table: VERS denotes the version of IP. H.LEN denotes the header length in units of

Military and space technology, crack the secret message and explain how the...

crack the secret message and explain how the code works. The clue is that it has something to do with the computer keyboard. J-Q-H-6 Q-E-F-Q-H-D-3-W 8-H 5-Y-3 7-W-3 9-R--D-9-J

Describe how ethernet deals with collisions, Problem (a) The IEEE 802 seri...

Problem (a) The IEEE 802 series of standards describe both the Physical and Data Link layers of their respective technologies. Two important standards are 802.3 and 802.5, respect

Introduction to risk management and its component, INTRODUCTION TO RISK MAN...

INTRODUCTION TO RISK MANAGEMENT Risk management is the procedure of identifying and controlling risks facing an organization. Risk management is the discipline which is employed

Data compression and the transport services, Da t a compre s sion a...

Da t a compre s sion and the trans p ort s e rvices,   The main purpose of the transport layer is to provide services which are efficient, reliable and cost-effecti

Hardware trojan detection, how to form the trojan integrated cirucit and wh...

how to form the trojan integrated cirucit and what are the tools are used to simulate the ciruit to our system and how to pass it as input to the clustering algorithm to get the ou

Explain the term quality of service in networks, QUESTION (a) One of th...

QUESTION (a) One of the biggest drawbacks that GNS3 has is that it supports only the IOS images of routers. This means that users cannot emulate Cisco switches. Suggest two sol

Software vulnerabilities, 1.  We used the National Vulnerability Database. ...

1.  We used the National Vulnerability Database. Select a recent vulnerability from that Database and analyse it from the following aspects: Criticality level Impact in

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd