Data units at different layers of the tcp/ ip protocol suite, Computer Network Security

Data units at different layers of the TCP/ IP protocol suite

The data unit prepared at the application layer is known a message, at the transport layer the data unit build is known either a segment or an user data packet, at the network layer the data unit build is named the data packet, at the data link layer the datagram is attached in to a frame and finally transferred as signals along the transmission path.

 

 

Posted Date: 8/20/2012 3:09:43 AM | Location : United States







Related Discussions:- Data units at different layers of the tcp/ ip protocol suite, Assignment Help, Ask Question on Data units at different layers of the tcp/ ip protocol suite, Get Answer, Expert's Help, Data units at different layers of the tcp/ ip protocol suite Discussions

Write discussion on Data units at different layers of the tcp/ ip protocol suite
Your posts are moderated
Related Questions
Proof that the sender forwards the message. It also prohibits the author of the code from falsely denying that he forward the message. This is achieved by record using the exact ti

Detect each visit to www.google.com that is made by the machine. o Send an alert when an activity relating to network chat is detected. o Send an alert when an attempt is made for

You are provided with 3000 sample keystrokes for 5 users mentioned above. You can find this data using the ‘Lab 2 User Data' link in the ‘Lab 2' folder on Blackboard. Please note t

QUESTION a) A switch basically operates by forwarding frames from one part of the network to another, based on MAC address. Describe the three types of switching namely store

Risk Identification Risk management comprises of identifying, classifying and prioritizing organization’s information assets, threats and vulnerabilities also. Risk Identificati

Ask You have been asked by a new client to assist in setting up a new computer for her coffee shop. She has just purchased the newest Apple computer from an online site. Should wou

Normal 0 false false false EN-US X-NONE X-NONE

QUESTION: (a) Explain, with the aid of a diagram, a Star topology of a network of your choice. (b) Illustrate on the use of a MAN and give an example of one. (c) Describe

Q. Explain about Security aware protocols? The security-Aware ad hoc Routing (SAR) protocol based on the security attributes integrated into the ad hoc route discovery provides

QUESTION a) Explain the terms traffic engineering, class-based queuing, shaping and grooming in an MPLS network. b) Using an example topology, illustrate the label swi