How do cryptography-based keys ensure the validity of data
transferred across the network?
Answer / deniaxis
Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the data was modified or corrupted.
| Is This Answer Correct ? | 7 Yes | 0 No |
i would like to say sir right now i have done hard/w networkig course ad doing a job as ATE engineer from CMS computer .Ltd so what r doing for future career ,which course is good ,&where is more opportunity plz tell me detils sir i m dialma??
Many business computers have three distinct and world wide unique identifiers. What are they?
Why Use VSATs?
In which of the 7 layers of OSI will a service handling conversion of characters is from EBCDIC to ASCII be normally implemented ?
I have 2 networks. One is LAN & other is Tata Indicom Modem which is connected to USB. The problem is that When USB Modem is using, i am unable to use LAN. And when we use LAN, we cannot use USB Modem. kindly help me.
Write a short note on ISDN?
why does blue screen of death occurs while installing the windows XP or any other OS installation
Discuss how satellite network differs from traditional networks such as Ethernet, Tokenbus.
Compare the maximum window size in go-back-N and selective-repeat ARQs.
How do cryptography-based keys ensure the validity of data transferred across the network?
what is Voltage levels of rs232x?
how to increase the ping packet size from 32 bytes to more bytes ?