Data units at different layers of the tcp/ ip protocol suite, Computer Network Security

Data units at different layers of the TCP/ IP protocol suite

The data unit prepared at the application layer is known a message, at the transport layer the data unit build is known either a segment or an user data packet, at the network layer the data unit build is named the data packet, at the data link layer the datagram is attached in to a frame and finally transferred as signals along the transmission path.

 

 

Posted Date: 8/20/2012 3:09:43 AM | Location : United States







Related Discussions:- Data units at different layers of the tcp/ ip protocol suite, Assignment Help, Ask Question on Data units at different layers of the tcp/ ip protocol suite, Get Answer, Expert's Help, Data units at different layers of the tcp/ ip protocol suite Discussions

Write discussion on Data units at different layers of the tcp/ ip protocol suite
Your posts are moderated
Related Questions
Types of IDSs and Detection Methods IDSs operate as network based, host based, or application based systems and focused on protecting network information assets. All the IDSs us

FRAGMENTATION AND PATH MTU IPv6 source is responsible for fragmentation. Routers simply drop datagrams bigger than network MTU. So source have to fragment datagram to arrive d

Problem a) Give the destination IP address, upper layer protocol, TTL in decimal and header checksum in hexadecimal; the source port number and the destination port number in deci

LEGAL, ETHICAL AND PROFESSIONAL ISSUES To minimize liabilities and reduce risks, information security practitioner should: •    to understand current legal environment •    to s

Host-Based IDS A host-based IDS (HIDS) resides on a particular computer or server and monitors activity only on that system. HIDS also called as system integrity verifiers as th

QUESTION (In this question, you will need to use the ISO 27001:2005 and ISO 27002:2005 standards) For each of the situations below, comment on the following: 1. Mention

QUESTION: (a) Show the Negative Cycle Algorithm in Minimum Cost Flows. (b) List the steps added in finding a Negative Cycle. (c) Apply Dijkstra's algorithm on the subs

QUESTION (a) Consider the following authentication options A. Using password B. Using pin and fingerprint Which option A or B provides stronger security and why? (b

(a) Describe the concept of zero knowledge proofs. Give a practical example. (b) Explain how a one way hash function works. (c) What are message authentication codes? (d)

How does the POP functions? What are the advantages/benefits of IMAP over POP? POP stands for Post Office Protocol, version 3 (POP3) is one of the easiest message access protoc