Virtual packets, Computer Network Security

VIRTUAL PACKETS

These data packets serve same reason in Internet as frames on LAN. Every packet has a header. Routers, which are normally gateways, transfer packets between physical networks.

 These data packets have a uniform hardware-independent message format. They add header and data and can't use format from any particular system. They are closed in hardware frames from delivery across every physical network.

 

Posted Date: 8/1/2012 7:53:35 AM | Location : United States







Related Discussions:- Virtual packets, Assignment Help, Ask Question on Virtual packets, Get Answer, Expert's Help, Virtual packets Discussions

Write discussion on Virtual packets
Your posts are moderated
Related Questions
Divide the user data into 6 equal sets. Use the first set for the enrollment phase of your system, and the rest for the verification phase. Use the following formula to calculate t

FRAGMENTATION Fragmentation information is kept in different extension header.  Every fragment has base header and fragmentation header. Whole datagram including original hea

The project will be involving a design and a report of which explain the simulation and how it functions. The aim of the project is to help the administrators and staff at the war

Question: (i) ‘Implementation' is a critical stage of the Systems Development Life Cycle. Show the four approaches which are commonly used to implement information systems in

Example : Softbank – theft of consumer data for extortion Softbank of Japan offers broadband Internet services across Japan through 2 subsidiaries – Yahoo! BB and Softbank BB. I

Hashing is the transformation of a string of characters into a generally shorter fixed-length key or a value that presents the original string. Hashing is used to index and retri

how much would you charge for minimum 20 pages

PROCESSING AN INCOMING ARP MESSAGE When an ARP message reaches, the protocol specifies that the receiver must operate two basic steps. First the receiver finds the sender's add

Asymmetric Encryption Asymmetric encryption method makes use of two different but related keys and either key can be used to encrypt or decrypt the message. This method is freque

Bridges perform both in the data link layers and physical of LANs of same kind. They split a bigger network in to smaller segments. They have logic that accept them to store the