Virtual packets, Computer Network Security

VIRTUAL PACKETS

These data packets serve same reason in Internet as frames on LAN. Every packet has a header. Routers, which are normally gateways, transfer packets between physical networks.

 These data packets have a uniform hardware-independent message format. They add header and data and can't use format from any particular system. They are closed in hardware frames from delivery across every physical network.

 

Posted Date: 8/1/2012 7:53:35 AM | Location : United States







Related Discussions:- Virtual packets, Assignment Help, Ask Question on Virtual packets, Get Answer, Expert's Help, Virtual packets Discussions

Write discussion on Virtual packets
Your posts are moderated
Related Questions
TCP-RELIABLE TRANSPORT SERVICE INTRODUCTION:  TCP is the major transport protocol architecture in the TCP/IP suite. It uses unreliable datagram function offered by IP whe

Question requires you to develop firewall rules based on a fictitious organisation. Scenario: You work for a security-conscious company, xC-Cure, who develop encryption tec

Deploying Host-Based IDSs -Proper implementation of HIDSs can be painstaking and time-consuming task .The process of deployment begins with implementing most critical systems fi

I have an assignment of Computer Security to submit. Will you guys help me making my assignment???

Gateways They transfer packets among network machines that have different protocols (e.g. between a WAN and a LAN). They access a packet formatted for one protocol and change

GROWTH OF LAN TECHNOLOGY The production of shared communication channels (LANs) started in 1960s and early 1970. The basic idea behind was to reduce the number of connectio

Question: (a) What are the various options to mitigate risks in an Information Security Management System (ISMS)? For each option specify an instance where it can be used.

how to link html with a data base

Question: (a) State whether the following statements are TRUE or FALSE. Justify your answer. i. A good site security policy will require that users use computer generated p

Asymmetric Encryption Asymmetric encryption method makes use of two different but related keys and either key can be used to encrypt or decrypt the message. This method is freque