Virtual packets, Computer Network Security


These data packets serve same reason in Internet as frames on LAN. Every packet has a header. Routers, which are normally gateways, transfer packets between physical networks.

 These data packets have a uniform hardware-independent message format. They add header and data and can't use format from any particular system. They are closed in hardware frames from delivery across every physical network.


Posted Date: 8/1/2012 7:53:35 AM | Location : United States

Related Discussions:- Virtual packets, Assignment Help, Ask Question on Virtual packets, Get Answer, Expert's Help, Virtual packets Discussions

Write discussion on Virtual packets
Your posts are moderated
Related Questions
Question 1: (a) (i) Radio waves are subject to several propagation problems. Name any three of them. (ii) A Wi-Fi receiver requires a signal power of 50mW to operate correc

QUESTION (a) (i) Describe Phishing attacks. (ii) Distinguish between Phishing and Spear Phishing attacks. (b) Describe two instances where an attacker sniffing on a netwo

Question: (a) What is the main security vulnerability of IPv4? (b) Which protocol can be used for secure remote login? (c) Distinguish between the transport and tunnel

What questions should Iris ask Charlie about the new job, about Kelvin''s team, and about the future of the company?

Thinking ethically is difficult without a background in moral philosophy. Asking people to embrace ethics without offering practical explanation of the efficacy of so doing, is a t

I have an assignment of Computer Security to submit. Will you guys help me making my assignment???

ADDRESS RESOLUTION AND PROTOCOL ADDRESSES Address resolution (ARP) is a network interface layer protocol. Protocol addresses are used in all upper layers. Address resolution s

A digital signature is a stamp on the data, which is unique and very hard to forge.  A digital signature has 2 steps and creates 2 things from the security perspective. STEP 1

Problem (a) Distinguish between passive and active attacks. (b) Give two reasons why it is important to organise security awareness programs for users. (c) Describe how

(a) Describe the concept of zero knowledge proofs. Give a practical example. (b) Explain how a one way hash function works. (c) What are message authentication codes? (d)