Define packet, Computer Network Security


Network systems splits data in small junks or blocks known as packets, which they send individually. Why we required packets rather than bits? The answer to this problem is because a receiver and sender need to coordinate to detect transmission exceptions. Also the individual connection between every pair of computers is not exist. That's why to solve these problems shared network connections are created among many workstations.


The demand of sharing is increasing very rapidly because many computers machine have to use the shared networks. In addition to this some programs have large data transfer. In this process they access the network for long time. But on the other way some programs cannot wait so long. So we require a method for fairness.


To the fairness, the solution is to split the data into small chunks or block called 'PACKETS'. Computers take turns to transmit one packet at a time over the shared connection. Because every packet is small so no computer experiences a long delay.



95_data Packet.png


In the diagram one reason for using the packets is explained. We see that in a shared resource when one pair of computer interacts, the other have to wait. To understand the need of packet here, let's see a transmission with data packets in the diagram.



A 5MB file transmitted across network with 56Kpbs capacity will need 12 minutes. This seems that all that computers will have to wait for 12 minutes before starting other transfers.


46_with packet.png



Now if the file is divided into packets, other computers must only wait until packet has been transmit.

Suppose file is divided into 1000 byte message. Now every data packet takes less than 0.2 seconds to send it. Here other computers have only


147_with packet.png


wait for 0.14 sec before starting to transmit.


Posted Date: 7/30/2012 5:18:43 AM | Location : United States

Related Discussions:- Define packet, Assignment Help, Ask Question on Define packet, Get Answer, Expert's Help, Define packet Discussions

Write discussion on Define packet
Your posts are moderated
Related Questions
Question (a) Consider that you enter the subsequent URL in the address bar of a popular web client and that both the server and client accepts HTTP version 1.1. i. What can be

Hello i have submitted an assignment and i am still waiting to know if it has been accepted or not the ref number is TicketID: EM201381BRY525CN, the due date is for monday 27th of

Question: (a) Your office administrator is being trained to take server backups. Which authorization model could be ideal for this situation: MAC, DAC or RBAC? Justify your a

Problem 1: a) One of the limitations of file processing systems is data inconsistency. Briefly explain with the help of an example what do you understand by this phrase. b)

Question: (a) Explain how the Diffie-Hellman key establishment protocol works. (b) Prove that the Diffie-Hellman key establishment protocol is vulnerable to a `man in the mi

Wireless Networks The origin of wireless networks and their ubiquity in the technological environment poses a new type of exposure and vulnerability for network security. Cont

Vulnerability Identification Specific avenues threat agents can exploit to attack an information asset are known as vulnerabilities. Examine how each threat can be generated and

Question: (a) Describe fully with example the two access control methods available to implement database security. (b) Discuss why database statistics (meta data) provide es

UDP DATAGRAM FORMAT: It is given in the figure below:

Ask question #Minimum.. 100 words accepted#