Encapsulation, Computer Network Security

ENCAPSULATION

Network interface layer adds IP datagram as data area in hardware frame. Hardware ignores IP datagram message format. Standards for encapsulation defines details.Standard describe data type for IP datagram, as well as others. Receiving protocol stack compiles data area based on frame type. The encapsulation procedure is given in the diagram below.

 

1760_encapsulation.png

 

ENCAPSULATION ACROSS MULTIPLE HOPS:

 Each router in the path from the source to the receiver unencapsulates incoming datagram from frame message, processes datagram and calculates next hop  and encapsulates datagram in outgoing message frame. Datagram can be encapsulated in different hardware format at every hop. Datagram itself is unmodified as given in the figure below.

2112_ENCAPSULATION ACROSS MULTIPLE HOPS.png

Posted Date: 8/1/2012 8:06:42 AM | Location : United States







Related Discussions:- Encapsulation, Assignment Help, Ask Question on Encapsulation, Get Answer, Expert's Help, Encapsulation Discussions

Write discussion on Encapsulation
Your posts are moderated
Related Questions
IPV6 BASE HEADER FORMAT: It has less information than IPV4 message header. Next header shows to first extension message header. Flow label is partitioned into a TRAFFIC CLASS

Security Clearances For a security clearance in organizations each data user should be assigned a single level of authorization indicating classification level. Before approachi

802.11 WIRELESS LANs AND CSMA/CA:  IEEE 802.11 is standard wireless LAN that needs radio signals at 2.4GHz. Its speed is 11Mbps. The older computers use radio signals at data

UDP DATAGRAM FORMAT: It is given in the figure below:

Information System Security 1. Write about: a. Potential Risks to Information Systems b. Factors to be addressed for making information systems more secure 2. Write about t

Routers They transfer packets among multiple interconnected network machines (i.e. LANs of different kind). They perform in the data link, physical and network layers. They ha

Symmetric Encryption This encryption method makes use of same “secret key” to encipher and decipher the message and it is termed as private key encryption. This type of encrypti

INFORMATION SECURITY POLICY PRACTICES AND STANDARDS Management from all the communities of interest should consider policies as basis for all information security efforts. Polic

Problem (a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. The second screen capture is from the data portion of the frame.

what is guided media or unguided media