Encapsulation, Computer Network Security

ENCAPSULATION

Network interface layer adds IP datagram as data area in hardware frame. Hardware ignores IP datagram message format. Standards for encapsulation defines details.Standard describe data type for IP datagram, as well as others. Receiving protocol stack compiles data area based on frame type. The encapsulation procedure is given in the diagram below.

 

1760_encapsulation.png

 

ENCAPSULATION ACROSS MULTIPLE HOPS:

 Each router in the path from the source to the receiver unencapsulates incoming datagram from frame message, processes datagram and calculates next hop  and encapsulates datagram in outgoing message frame. Datagram can be encapsulated in different hardware format at every hop. Datagram itself is unmodified as given in the figure below.

2112_ENCAPSULATION ACROSS MULTIPLE HOPS.png

Posted Date: 8/1/2012 8:06:42 AM | Location : United States







Related Discussions:- Encapsulation, Assignment Help, Ask Question on Encapsulation, Get Answer, Expert's Help, Encapsulation Discussions

Write discussion on Encapsulation
Your posts are moderated
Related Questions
Question 1: (a) With the help of a diagram show the basic structure of a computer system. (b) Explain as fully as you can each of the parts mentioned above. (c) What are

Problem (a) Name the various layers of the OSI model. (b) Show, by means of a diagram, how  the TCP/IP  reference model  is different from the OSI-7 reference model? Why is

RING topology all computers are connected in loop. A ring topology is a network topology in which every node connects to exactly two other devices, forming a single continuous pa

Question 1: (a) Explain the operation of the "matchmaker" middle agent. (b) Describe why broker middle agents are more efficient in terms of the time taken for a service to


Question: (a) What do you understand by the term "integrity"? (b) Which type of attack denies authorized users access to network resources? (c) You have discovered tha

TRANSMISSION ERRORS:  Transmission exceptions may happen due to different causes for example power surges or interference may delete data during transmission. In result of wh

Question requires you to produce a pcap file from a Wireshark capture.  In addition, you must include a screen capture of Wireshark and some specific information regarding the fram

Enterprise Information Security Policy (EISP) EISP also known as security policy directly supports the mission of the organization and sets the strategic direction, scope, and t

QUESTION (a) Hashing and salting is commonly used as password storage techniques for most applications. Describe how hashing and salting enable secure storage of password (b