Packets and frames, Computer Network Security

PACKETS:

Packet is a generic word that define to small code of data. Packet have different format. Each hardware needs different packet format.

 FRAME:

A hardware frame or frame shows a packet of a specific format on a specific Hardware method.

 FRAME FORMAT:

We require to describe a standard format for data to show the beginning and end of the frame. Tail and header are used to frame the data as given in the figure below.

2366_Frame Format.png

We see that in the diagram eot and soh are used to show the start of header and end of tail.

Posted Date: 7/30/2012 5:25:15 AM | Location : United States







Related Discussions:- Packets and frames, Assignment Help, Ask Question on Packets and frames, Get Answer, Expert's Help, Packets and frames Discussions

Write discussion on Packets and frames
Your posts are moderated
Related Questions
Information and Network Security Part 1- Recovery of an encrypted `word' using a forward search attack. Complete and correct summary for part 1. Adequately commented, clea

QUESTION (a) Briefly explain the contents of the Needs Analysis, which is step in the process of network design. (b) Describe on the three ways of improving the performan

In Star topology all computers are connected using a central device known as hub. Star networks are one of the most general computer network topologies. In its simplest way, a

(a) (i) Bob has public RSA key (n = 77, e = 7). Show that Bob's private key is (d = 43). (ii) Alice wants to send the message m = 13 to Bob. She encrypts the message usi

LEGAL, ETHICAL AND PROFESSIONAL ISSUES To minimize liabilities and reduce risks, information security practitioner should: •    to understand current legal environment •    to s

IPv6 ADDRESSING IPv6 has 128-bit addresses. A 128-bit address adds network prefix and host suffix. An benefit of IPv6 addressing is that there is address classes i.e. prefix/s

Network security is an issue for companies regardless of whether they participate in electronic commerce; however, since most organizations have a Web site that allows some interac

(a) Describe RSA encryption. (b) For an RSA encryption the values of the primes are: p=29, q=31. select e=11, evaluate the public and private keys. (c) How can RSA be used fo

Sometimes the special character may see in data and as a part of data they will be misinterpreted as packet data. The solution to this cause is Byte stuffing.   In general to

NSTISSC SECURITY MODEL The NSTISSC Security Model provides a detailed perspective on security. While the NSTISSC model covers the 3 dimensions of information security, it removes