Encapsulation, Computer Network Security

ENCAPSULATION

Network interface layer adds IP datagram as data area in hardware frame. Hardware ignores IP datagram message format. Standards for encapsulation defines details.Standard describe data type for IP datagram, as well as others. Receiving protocol stack compiles data area based on frame type. The encapsulation procedure is given in the diagram below.

 

1760_encapsulation.png

 

ENCAPSULATION ACROSS MULTIPLE HOPS:

 Each router in the path from the source to the receiver unencapsulates incoming datagram from frame message, processes datagram and calculates next hop  and encapsulates datagram in outgoing message frame. Datagram can be encapsulated in different hardware format at every hop. Datagram itself is unmodified as given in the figure below.

2112_ENCAPSULATION ACROSS MULTIPLE HOPS.png

Posted Date: 8/1/2012 8:06:42 AM | Location : United States







Related Discussions:- Encapsulation, Assignment Help, Ask Question on Encapsulation, Get Answer, Expert's Help, Encapsulation Discussions

Write discussion on Encapsulation
Your posts are moderated
Related Questions
Advantages and Disadvantage of Packet Filtering firewall   Advantages One screening router can help protect entire network One key advantage of packet filter

QUESTION (a) Describe the two possible configurations for 3DES (b) What is the main disadvantage of 3DES? (c) Why are most modern symmetric algorithm block ciphers? (d

Get a copy of Metasploitable at Make">http://sourceforge.net/projects/metasploitable/files/Metasploitable2/ Make sure to follow these directions very carefully. You will get po

IPV6 NEXT HEADER It is given in the figure below:

QUESTION a) A switch basically operates by forwarding frames from one part of the network to another, based on MAC address. Describe the three types of switching namely store

Host-Based IDS A host-based IDS (HIDS) resides on a particular computer or server and monitors activity only on that system. HIDS also called as system integrity verifiers as th

QUESTION Testing of a Business Continuity Plan (BCP) does not need to be costly or to interrupt the daily operations of the business. The result of the test should also be look

Use the Chinese remainder theorem to evaluate x from the following simultaneous congruences: x ≡ 1 (mod 2); x ≡ 2 (mod 3); x ≡ 3 (mod 5). Calculate gcd(14526, 2568). (

(a) What is a pseudorandom generator? Give an example describing how it works. (b) Explain the key components of a wireless network and their purpose. (c) Describe the authen

Question : (a) There are two approaches for providing confidentiality for packets in a network using symmetric encryption: End-to-End Encryption and Link Encryption. State wh