How do cryptography-based keys ensure the validity of data
transferred across the network?
Answer Posted / deniaxis
Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the data was modified or corrupted.
Is This Answer Correct ? | 7 Yes | 0 No |
Post New Answer View All Answers
What is your most recent experience with VERTAS backup software?
Hi i need one website name.Which is used to identify or find the system or person who or which are logged in to the Internet or working with Internet.We can watch and access their drives(memory) also through that website.Could you please tell me which is that website.Please answer me.Advance thanks
how to take backup of BIOS ?
What is the minimum and maximum length of the header in the TCP segment and IP datagram
Explain Attenuation?
Explain different kinds of Switching techniques.
What is multicast routing
In which of the 7 layers of OSI will a service handling conversion of characters is from EBCDIC to ASCII be normally implemented ?
up to which ver of linux using lilo boot loader? last ver of linux.
Explain Traffic shaping using token bucket algorithm
Write a short note on ISDN?
What is the average number of transmission required to send a frame of length 1600 bytes correctly, if the bit error rate is 1 x 10-6.
how do u share printer through FTP(fire transfer protocol)?
Which device is needed to connect two LANs with different network Ids ?
what are the two sub layers of data link layer called ?