How do cryptography-based keys ensure the validity of data
transferred across the network?
Answer Posted / deniaxis
Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the data was modified or corrupted.
| Is This Answer Correct ? | 7 Yes | 0 No |
Post New Answer View All Answers
Define Satellite Networks
Explain Salient difference between ISO-OSI and TCP/IP models.
What is the average number of transmission required to send a frame of length 1600 bytes correctly, if the bit error rate is 1 x 10-6.
Write short note on any four of the following:
What do you mean by link to link layers of OSI reference model? Explain their functions briefly?
which is the latest version of dos? & what is the command to copy windows files (i386) without formatting OS?
Explain network topologies ?
give an example of bus type network.
Explain CSMA/CD
Differentiate between static and dynamic channel allocation.
Which one you will use to implement critical section? Binary Semaphore
What is a transparent bridge?
hi , can you Suggest me the books (with author names) to learn Network programming from basics. Thanks in Advance... Prakash
What is source route
A binary signal is sent over a 3-khz channel whose signal-to-noise ratio is 20 db.Calculate the maximum achievable data rate ?