How do cryptography-based keys ensure the validity of data
transferred across the network?
Answer / deniaxis
Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the data was modified or corrupted.
Is This Answer Correct ? | 7 Yes | 0 No |
What is the advantage of Ring network ?
What is tdm?
A binary signal is sent over a 3-khz channel whose signal-to-noise ratio is 20 db.Calculate the maximum achievable data rate ?
What is the baud rate of a standard 10 mbps Ethernet LAN ?
What is difference between ARP and RARP?
6 Answers CTS, Elgi Equipments,
What are the two reasons for using layered protocols?
Does Ethernet 10Gbps support multiple access
Compare the maximum window size in go-back-N and selective-repeat ARQs.
Checksum in IP packet is
What MAU?
0 Answers Elgi Equipments, MCN Solutions,
How to identify HUB and SWITCH, without connecting to network? Is it possible?
Talk about diffrent types of cables used in lan cabling?
18 Answers AdOn, College School Exams Tests, Genpact,