How do cryptography-based keys ensure the validity of data
transferred across the network?
Answer Posted / deniaxis
Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the data was modified or corrupted.
| Is This Answer Correct ? | 7 Yes | 0 No |
Post New Answer View All Answers
What are the basic functions of the data link layer?
What is the function of data link layer?
Compare the maximum window size in go-back-N and selective-repeat ARQs.
How to communicate between difference process?
According to you which is the most important OSI layer?
What is MAC address
What is the range of addresses in the classes of internet addresses
Define Enterprise Networks
Explain FDDI
Explain pure-ALOHA and slotted- ALOHA systems. Give the expression for throughout for each,clearly explaining the various terms.
What are the principles that were applied to arrive at the seven layers in OSI model?
how many types of backups are there & explain them in theory mode & practical mode?
Explain Difference between congestion control and QoS(or Quality of service)
What does ‘data transparency’ mean ? With the help of a flow chart, explain the process of bit de-stuffing at the receiver’s end.
Define Consumer Satellite Products