unresponsive.
<p><br>
+<object data="silc_network.jpg" type="application/postscript">
<img src="silc_network.png" alt="SILC Network" align="center" border"0">
+</object>
<p><br>
The diagram above illustrates a portion of the SILC network. It shows
network as its primary route.
<p><br>
+<object data="silc_routers.jpg" type="application/postscript">
<img src="silc_routers.png" alt="SILC Routers" align="center" border"0">
+</object>
<p><br>
The diagram above illustrates how the routers forms a ring in the network.
defined in the protocol.
<p><br>
+<object data="silc_packet.jpg" type="application/postscript">
<img src="silc_packet.png" alt="Typical SILC Packet" align="center" border"0">
+</object>
<p><br>
As the diagram above illustrates the SILC packet is constructed from the
have clients on the channel and all clients that have joined the channel.
<p><br>
-<OBJECT data="silc_channel.jpg" type="application/postscript">
+<object data="silc_channel.jpg" type="application/postscript">
<img src="silc_channel.png" alt="Channel Message Delivery" align="center" border"0">
-</OBJECT>
+</object>
<p><br>
The diagram above illustrates typical delivery of channel messages inside
re-encrypted everytime it is sent further to the receiving client.
<p><br>
+<object data="silc_priv1.jpg" type="application/postscript">
<img src="silc_priv1.png" alt="Basic Private Message Delivery" align="center" border"0">
+</object>
<p><br>
As the above diagram shows the private messages sent by Client A to the
routers in the SILC network.
<p><br>
+<object data="silc_priv2.jpg" type="application/postscript">
<img src="silc_priv2.png" alt="Private Messages with Private Message Key" align="center" border"0">
+</object>
<p><br>
As the above diagram shows the Client A encrypts the message with private
key which it uses to decrypt the message.
<p><br>
+<object data="silc_priv3.jpg" type="application/postscript">
<img src="silc_priv3.png" alt="Private Messges with Public Key Cryptosystem" align="center" border"0">
+</object>
<p><br>
As the above diagram shows the Client A has the Client B's public key.