Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
what are the key functions of data link layerdata link layer transfers data in a structured and reliable manner so that the service given by the
how two adjacent layers communicate in a layered network or what do you mean by service access pointin layered network each layer has lots of
briefly write functionalities of different osi layersthe osi reference model includes seven layers basic functionality of each of them is as follows1
what do you mean by osithe open system interconnection osi reference model explains how information from a software application in one computer moves
what are the key benefits of layered networkmain advantages of layered network are given belowa complex systems can be split into understandable
why it is necessary to have layering in a networka computer network is a very complex system it becomes very difficult to execute as a single entity
how is computer networks used in marketing and sales financial services teleconferencingcomputer network have led to a new age of all of these
what are the main categories based on which applications of computer network can be categorizedthe major areas under which the applications for
what is internetinternet is a collection of networks or network of networks various networks like lan and wan connected by suitable hardware and
what are the two types of transmission technologies basis on which computer networks can be categorized broadly there are two types of transmission
mention different categories of computer networks on the basis of scale and distinguish one from the otherlocal area network lanmetropolitan area
what are the two broad class classifications under which networks can be dividedall computer networks fit in one of the two dimensions
q factors effects the quality of image of monitorfour factors effects the quality of image of monitor 1 phosphor coating this affects the
q what is peripheral connect interfacepci signify peripheral connect interface its the revolutionary high speed expansion bus presented by intel
q security and reciprocity of rsasecurity and reciprocity of rsa - kp and n are issued publicly- ks is kept secret- since the snooper does not know p
q illustrate about rsa encryptionrsa encryption - public key encryption technique- encryption steps- encode data to be encrypted as a number to
q show the data encryption standarddata encryption standard - bit-level encryption method designed by ibm- adopted as standard for nonmilitary and
q show the character-level encryption- substitutional- monoalphabetic - simplest form also called caesar cipher- every character is replaced with
q categories of encryption - decryption categories of encryptiondecryption - symmetric-key - encryption key ke and the decryption key kd are the same
q describe about cryptography- some media cannot be protected from unauthorized reception or interception- encryption involves transforming the
q show vpns security and the internet model- vpns security and the internet model- application layer - provide for each application protocol other
q what are the trends in network security trends in network security improved vigilance for virus infections continual maturation of firewall
q building a defense in networkingwhen building a defense you must use a layered approach that includes securing- the network infrastructure the
q what are the tools sued for cryptography and web securitytools - cryptography vpn- remote accesspgp- emaildedicated circuits-tunnels- ipsectools -
q explain the types of security servicesecurity services fall into one of the subsequent categories- confidentiality confirms that the info in a