Data units at different layers of the tcp/ ip protocol suite, Computer Network Security

Data units at different layers of the TCP/ IP protocol suite

The data unit prepared at the application layer is known a message, at the transport layer the data unit build is known either a segment or an user data packet, at the network layer the data unit build is named the data packet, at the data link layer the datagram is attached in to a frame and finally transferred as signals along the transmission path.

 

 

Posted Date: 8/20/2012 3:09:43 AM | Location : United States







Related Discussions:- Data units at different layers of the tcp/ ip protocol suite, Assignment Help, Ask Question on Data units at different layers of the tcp/ ip protocol suite, Get Answer, Expert's Help, Data units at different layers of the tcp/ ip protocol suite Discussions

Write discussion on Data units at different layers of the tcp/ ip protocol suite
Your posts are moderated
Related Questions
Question : (a) How does a 2-key rollover differ from the N-key rollover? (b) Why is isolation so important in interfacing? (c) Explain what is software debouncing.

Attacker's Motives behind the Cyber Attack Before adapting the necessary measures to deal with the problem, understanding and evaluating the blogger's psyche and his motivation

QUESTION: (a) For the bit stream 010011, sketch the waveforms for each of the code indicated. Assume that the signal level for a space in NRZ-L is positive; the signal level f

BALANCING SECURITY AND ACCESS Even with best planning and implementation, it is impossible to obtain perfect security, that is, it is a process, not an absolute. Security should

Problem (a) Describe RSA algorithm with an example. (b) Answer the following RSA encryption, given the values of the primes are: p = 17, q = 11 and choosing e = 7. (c)

i have an idea of clustering in wsns . where each and every sensor node use the reputation scheme and while clustering provide help against the selfishness atatck of the sensor nod

Question: (a) Distinguish between a mobile agent "state" and "code". (b) Differentiate between "weak" and "strong" mobility. (c) Mobile agent systems are known to have


Question: a) Differentiate between ‘Gross Settlement' and ‘Multilateral Net Settlement' providing suitable examples where necessary to support your answer. b) Differentia

(a) Using the extended Euclidean algorithm, find the multiplicative inverse of 504 mod 67. (b) Decrypt the following ciphertext, which has been encrypted using Caesar cipher: