February 2015 Archive

A Brief Foray into IP Security
A Brief Foray into IP Security

"Internet Control Message Protocol (ICMP)" covered IPv4 in some detail, containing the services it provides and how those services are implemented. While reading through that section, you may have noticed that there was no mention of any security services. In fact, IPv4 was

Tags computer network, virtual private networks, routers, hosts, cryptographic algorithms
Routing Algorithms
Routing Algorithms

Up to now in this section, we've mostly looked at the network layer's forwarding function. We studied that when a packet arrives to a router, the router indexes a forwarding table and determines the link interface to which the packet is to be directed. We also studied that routing

Tags forwarding tables, network layer, source router, destination router, routing algorithm
Page 1 of 1 Previous 1 Next

Copy Right

The contents available on this website are copyrighted by TechPlus unless otherwise indicated. All rights are reserved by TechPlus, and content may not be reproduced, published, or transferred in any form or by any means, except with the prior written permission of TechPlus.