Define packet, Computer Network Security

Assignment Help:

CONCEPT OF PACKET :

Network systems splits data in small junks or blocks known as packets, which they send individually. Why we required packets rather than bits? The answer to this problem is because a receiver and sender need to coordinate to detect transmission exceptions. Also the individual connection between every pair of computers is not exist. That's why to solve these problems shared network connections are created among many workstations.

PROBLEMS WITH SHARING:

The demand of sharing is increasing very rapidly because many computers machine have to use the shared networks. In addition to this some programs have large data transfer. In this process they access the network for long time. But on the other way some programs cannot wait so long. So we require a method for fairness.

SOLUTION FOR FAIRNESS:

To the fairness, the solution is to split the data into small chunks or block called 'PACKETS'. Computers take turns to transmit one packet at a time over the shared connection. Because every packet is small so no computer experiences a long delay.

 

 

95_data Packet.png

 

In the diagram one reason for using the packets is explained. We see that in a shared resource when one pair of computer interacts, the other have to wait. To understand the need of packet here, let's see a transmission with data packets in the diagram.

 

WITHOUT PACKETS:

A 5MB file transmitted across network with 56Kpbs capacity will need 12 minutes. This seems that all that computers will have to wait for 12 minutes before starting other transfers.

 

46_with packet.png

 

WITH PACKETS:

Now if the file is divided into packets, other computers must only wait until packet has been transmit.

Suppose file is divided into 1000 byte message. Now every data packet takes less than 0.2 seconds to send it. Here other computers have only

 

147_with packet.png

 

wait for 0.14 sec before starting to transmit.

 


Related Discussions:- Define packet

Syntax conversion, Write down the significance of the syntax conversion . S...

Write down the significance of the syntax conversion . Syntax Conversion is described below: Syntax conversion is a significant function carried out in the presentation layer. I

Token ring, TOKEN RING Many LAN methods that are ring topology need to...

TOKEN RING Many LAN methods that are ring topology need token passing for synchronized access to the ring. The ring itself is acts as a single shared communication phase. Both

What is the major security flaw of set, QUESTION (a) Discuss why it is ...

QUESTION (a) Discuss why it is considered more secure to use the SET (Secure Electronic Transaction) for e-commerce instead of using SSL (b) Describe how the dual signature

Describe the five-layer network using block diagrams, Problem 1: a) One...

Problem 1: a) One of the limitations of file processing systems is data inconsistency. Briefly explain with the help of an example what do you understand by this phrase. b)

What is the role of an intrusion detection system, Problem: (a) What i...

Problem: (a) What is a firewall and which are its most important tasks? (b) What is the difference between default deny and default permit? Which advantages and disadvanta

Introduction to planning for security, INTRODUCTION TO PLANNING FOR SECURIT...

INTRODUCTION TO PLANNING FOR SECURITY The creation of an information security program begins with creation and review of organization’s information security policies, standards,

Tomcat server, how to access tomcat by internet

how to access tomcat by internet

Guided media, Guided Media These are those that give a conduit from on...

Guided Media These are those that give a conduit from one machine to another that add twisted-pair, fiber-optic cable and coaxial cable. A signal traveling along any of these

Explain transposition ciphers and substitution cipher, What do you understa...

What do you understand by cryptanalysis? Discuss about the transposition ciphers substitution cipher, and onetime pads. The messages which are intended to transmit secretly and

Find the capacity of the wcdma, Question: (a) Describe the term interfe...

Question: (a) Describe the term interference in the space, time, frequency, and code domain. (b) Consider a 1 G - AMPS: 824-849 MHz (forward) ; 869-894 MHz (reverse). B

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd