Encapsulation, Computer Network Security

Assignment Help:

ENCAPSULATION

Network interface layer adds IP datagram as data area in hardware frame. Hardware ignores IP datagram message format. Standards for encapsulation defines details.Standard describe data type for IP datagram, as well as others. Receiving protocol stack compiles data area based on frame type. The encapsulation procedure is given in the diagram below.

 

1760_encapsulation.png

 

ENCAPSULATION ACROSS MULTIPLE HOPS:

 Each router in the path from the source to the receiver unencapsulates incoming datagram from frame message, processes datagram and calculates next hop  and encapsulates datagram in outgoing message frame. Datagram can be encapsulated in different hardware format at every hop. Datagram itself is unmodified as given in the figure below.

2112_ENCAPSULATION ACROSS MULTIPLE HOPS.png


Related Discussions:- Encapsulation

Explain what is software debouncing, Question : (a) How does a 2-key r...

Question : (a) How does a 2-key rollover differ from the N-key rollover? (b) Why is isolation so important in interfacing? (c) Explain what is software debouncing.

How does tcp perform the functions, Problem: (a) Assume that a new ap...

Problem: (a) Assume that a new application layer protocol is developed for video conferencing application. Which transport layer protocol, between TCP and UDP, will you u

Draw the waveform for an asynchronous transmission, (a) Draw the waveform ...

(a) Draw the waveform for an asynchronous transmission with the given specifications: 8 data bits with value 11010001 (LSB listed first here), one parity bit (even), one star

Vulnerability scanners, VULNERABILITY SCANNERS Active vulnerability scan...

VULNERABILITY SCANNERS Active vulnerability scanners scan networks for detailed information, it initiate traffic to determine security holes. This scanner identifies usernames a

Risk assessment, RISK ASSESSMENT Risk assessment is a step in a risk man...

RISK ASSESSMENT Risk assessment is a step in a risk management technique. Risk assessment is the determination of quantitative or qualitative value of risk related to a concrete

Compare the suitability and properties of isdn and adsl, Question : An a...

Question : An aircraft manufacturing company is considering linking the network of one of its offices to the network of its Headquarter using either xDSL or ISDN. i. Compare

Analysis of the problem of cyber attack, Q. Analysis of the Problem of cybe...

Q. Analysis of the Problem of cyber attack? According to the case, The EZ Company is a prominent organization specialized in information integration and visualization technolog

Risk management discussion points, Risk Management Discussion Points Org...

Risk Management Discussion Points Organizations should define level of risk it can live with Risk appetite: it defines quantity and nature of risk which organizations are wil

Calculate the dynamic range of the 16-bit scanner, You are hired as a consu...

You are hired as a consultant to help design a digital library in which books are scanned and stored digitally and made available to users of the World Wide Web. Assume that the li

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd