Define packet, Computer Network Security

Assignment Help:

CONCEPT OF PACKET :

Network systems splits data in small junks or blocks known as packets, which they send individually. Why we required packets rather than bits? The answer to this problem is because a receiver and sender need to coordinate to detect transmission exceptions. Also the individual connection between every pair of computers is not exist. That's why to solve these problems shared network connections are created among many workstations.

PROBLEMS WITH SHARING:

The demand of sharing is increasing very rapidly because many computers machine have to use the shared networks. In addition to this some programs have large data transfer. In this process they access the network for long time. But on the other way some programs cannot wait so long. So we require a method for fairness.

SOLUTION FOR FAIRNESS:

To the fairness, the solution is to split the data into small chunks or block called 'PACKETS'. Computers take turns to transmit one packet at a time over the shared connection. Because every packet is small so no computer experiences a long delay.

 

 

95_data Packet.png

 

In the diagram one reason for using the packets is explained. We see that in a shared resource when one pair of computer interacts, the other have to wait. To understand the need of packet here, let's see a transmission with data packets in the diagram.

 

WITHOUT PACKETS:

A 5MB file transmitted across network with 56Kpbs capacity will need 12 minutes. This seems that all that computers will have to wait for 12 minutes before starting other transfers.

 

46_with packet.png

 

WITH PACKETS:

Now if the file is divided into packets, other computers must only wait until packet has been transmit.

Suppose file is divided into 1000 byte message. Now every data packet takes less than 0.2 seconds to send it. Here other computers have only

 

147_with packet.png

 

wait for 0.14 sec before starting to transmit.

 


Related Discussions:- Define packet

How to create a security policy, Five years ago, Calgary Kids' Cloth Ltd wa...

Five years ago, Calgary Kids' Cloth Ltd was just a small retail store in downtown Calgary. The company started their own factory in SE Calgary to produce outdoor clothes for kids.

Evaluate the percentage availability of the network, QUESTION a) "Two ...

QUESTION a) "Two of the key attributes of an enterprise network is that it have to be multi-platform and multisite." Decribe what you understand by this statement. b) A

Vulnerability identification-risk management, Vulnerability Identification ...

Vulnerability Identification Specific avenues threat agents can exploit to attack an information asset are known as vulnerabilities. Examine how each threat can be generated and

Address resolution with closed-form computation, ADDRESS RESOLUTION WITH CL...

ADDRESS RESOLUTION WITH CLOSED-FORM COMPUTATION For networks use reliable addressing, it is possible to select an address that creates closed-form address resolution possible.

Vigenere Cipher, What key which if used to encrypt the ciphertext again wou...

What key which if used to encrypt the ciphertext again would give back the plaintext (i.e. key is a weak key)? Define a formula for identifying weak keys for the cipher below (

Describe the process of components identification, Probelm 1: Give the ...

Probelm 1: Give the History and Evolution of Wireless Communication System. Complete explanation Probelm 2: Describe the process of Components Identification and cal

Cyber security, How to pretect my computer from attacking

How to pretect my computer from attacking

Cracking the Vigenere Cipher, The following message was enciphered with a V...

The following message was enciphered with a Vigenère cipher. aikiaawgfspxeppvjabjnivulfznzvkrlidamsmyamlvskniyffdpbwtnxsvvbtnamvltsefoeycztkomylmerkwrs deusjgecmzkwvnreeyp

Data classification and management, Data Classification and Management C...

Data Classification and Management Corporate and military organizations use a several of classification schemes. Information owners are responsible for classifying information a

Network security attacks, (a) Show four Network Security attacks. How do th...

(a) Show four Network Security attacks. How do they compromise security? (b) In what ways do the following devices or services contribute to security: (i) Firewall (ii) In

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd