How do cryptography-based keys ensure the validity of data
transferred across the network?
Answer / deniaxis
Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the data was modified or corrupted.
|Is This Answer Correct ?||4 Yes||0 No|
what are the major componets of client server application?
NFS server + Solaris client + Linux client, all connected at GigE to the same switch. The Linux client is fast but the Solaris client is slow. Explain troubleshooting steps
Suppose an organization uses Kerberos for authentication. In terms of security and service availability, what is the effect if AS or TGS goes down?
Why does ATM use the cell of small and fixed length ?
Tell an example of bus type network.
What are the advantages and disadvantages of switch
a node has the ip address 188.8.131.52 and 184.108.40.206. But it is transmitting data from node1 to node2 only. The reason may be a)a node cannot have more than one address b)class A should have second octet different c)classB " " " " " d)a,b,c
Enumerate the main responsibilities of data link layer ?
What is socket and server socket?
what is scsi?. what we do if scsi/scsi drive failed?.
Assume you have to build 30 systems (mix of Solaris + Linux) in a brand new place (ie: no existing infrastructure). How do you tackle this?
what is Brouter?