How do cryptography-based keys ensure the validity of data
transferred across the network?
Answer Posted / deniaxis
Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the data was modified or corrupted.
| Is This Answer Correct ? | 7 Yes | 0 No |
Post New Answer View All Answers
Explain the following ARQ techniques in detail 1. Stop and wait ARQ 2. Selective repeat ARQ
What is a transparent bridge?
what happens when two consigitive ports of switch are connacted using one cross cabel with each other?(how the whole network gets down)
If the transmitted code word is 10011000 and the received code word is 11001001. What is the error word ? Write transmitted code word , received code word and error word as polynomials.
Give the equivalent binary word for the polynomial x8+x2+x+1.
Compare satellite with fiber as a communication medium and enumerate the application areas where satellite still holds a niche(or special)marker.
Discuss the following terms with respect to ATM: VPI, UNI, asynchronous, AAL, Cell, PVC.
Explain Salient difference between ISO-OSI and TCP/IP models.
Why is a data link layer switch preferred over a hub ?
Explain ATM reference model.
Outline and discuss the main fields in Ethernet IEEE 802.3 frame. What are the main objectives of preamble ?
Discuss how satellite network differs from traditional networks such as Ethernet, Tokenbus.
What is silly window syndrome
what is piggy backing?
Explain what is meant by the term ‘integrated service digital network’. Give three reasons a company might choose an ISDN link in preference to a leased line.