51. It uses a hash function and a symmetric key to create message authentication code.
52. It can be considered analogous to the algorithms used to calculate checksums or perform CRC checks for error detection.
53.
54. The destination device does the same calculation using the key the two devices share, which enables it to see immediately if any of the fields in the original datagram were modified (either due to error).