Packets and frames, Computer Network Security

PACKETS:

Packet is a generic word that define to small code of data. Packet have different format. Each hardware needs different packet format.

 FRAME:

A hardware frame or frame shows a packet of a specific format on a specific Hardware method.

 FRAME FORMAT:

We require to describe a standard format for data to show the beginning and end of the frame. Tail and header are used to frame the data as given in the figure below.

2366_Frame Format.png

We see that in the diagram eot and soh are used to show the start of header and end of tail.

Posted Date: 7/30/2012 5:25:15 AM | Location : United States







Related Discussions:- Packets and frames, Assignment Help, Ask Question on Packets and frames, Get Answer, Expert's Help, Packets and frames Discussions

Write discussion on Packets and frames
Your posts are moderated
Related Questions
Spambot Detection: The  previous studies in this field  have focused on content and meta-content based features.  The main assumption in this area of spam detection of late is

Netfilter Firewall Netfilter is the popular name for the packet filtering system installed by default in the Linux kernel. The filtering system can be used as a very effective

Question: A regional police force has the following corporate objectives: ? to reduce crime and disorder; ? to promote community safety; ? to contribute to delivering just

PACKET SNIFFERS A packet network protocol analyzer is a network tool which collects copies of packets from network and analyzes them. It can give network administrator with valu

Border Gateway Protocol It is a protocol needed to advertise the set of networks that can be achieved within an autonomous machine. BGP activates this information to be shared

#Under what circumstances would the use of a SecSDLC be more appropriate than an SDLC?

Hashing is the transformation of a string of characters into a generally shorter fixed-length key or a value that presents the original string. Hashing is used to index and retri

Question: (a) Describe how IPSec provides data source authentication. (b) Which protocol can be used to provide limited traffic analysis confidentiality? Why is it "limite

Problem (a) Distinguish between passive and active attacks. (b) Give two reasons why it is important to organise security awareness programs for users. (c) Describe how

Task 1 a. Consider the table showing the relative frequencies of letters in English. Arrange the frequencies from largest to smallest, and make a cumulative plot, using Exc