answersLogoWhite

0

Please provide more information in the discussion page.

User Avatar

Wiki User

16y ago

What else can I help you with?

Related Questions

Which connection provides a secure CLI session with encryption to a Cisco switch?

To provide a secure CLI session with encryption to a Cisco switch an SSH or Secure Shell connection will be required as this uses a cryptographic network protocol that provides secure data communication.


What advantages does sftp have over ftp?

Ftp is NOT a secure protocol. All usernames and passwords exchanged in setting up an FTP connection are sent in cleartext, data exchanged over and FTP connection is not encryption and the connection is subject to hijacking. A SFTP protocol however, is secure, thus your information is far safer.


Creates a secure connection between a client and a server and can safeguard your credit card information?

Secure Sock Layer (SSL) is a encryption protocol that will keep your traveling data secure


Explain the difference between a connection-oriented protocol and a connectionless protocol and give an example of each?

Different from a connectionless protocol, a connection-oriented protocol guaranties the delivery of the information. An example of connection-oriented protocol is (TCP) and a connectionless protocol is (UDP). TCP is a connection-oriented protocol, it makes a connection and checks whether the data is received, and resends if it is not. UDP is a connectionless protocol, it does not guarantee delivery by first connecting and checking whether data is received.


What can L2TP do for someone's network?

L2TP is a tunneling protocol for an IP network. L2 data is transmitted over the network but has no encryption or authentication abilities. This type of protocol is usually paired with IPSec to provide encryption and authentication.


Why connection oriented is more reliable than connection less protocol?

Connection oriented is more reliable because there is an acknowledgment received from data receiver (destination) that the data is receiving and transfer is successful which is not received from connection less protocol.


What is the Principles of Reliable Data Transfer?

A reliable data transfer is one that is stable . For a reliable data transfer a connection oriented protocol is used. A connection oriented protocol is one that receives acknowledgement from the receiver before sending the further data.


Which type of protocol is useful when data must be transferred fast?

connectionless protocols. A connection less protocol's lack of sophistication makes it more efficient than a connection-oriented protocol and renders it useful in situations in which data must be transferred quickly


Which layer of the OSI model is responsible for formatting and encrypting data?

The layer of the OSI Model that deals with encryption, would be the sixth layer, the presentation layer. It deals with the SSL/TLS protocol which pretty much just turns your regular HTTP (hypertext transfer protocol) into HTTPS (hypertext transfer protocol secure.) It adds an encryption to certain web pages that would deal with you credit card or any other private information dealt with.


Which protocol offers guaranteed delivery and is connection oriented?

Transmission Control Protocol (TCP) is used when data reliability is needed since it is connection oriented and guarantees delivery.


What transports data into a computer?

The transmission control protocol or TCP is used for connection oriented transmissions of data into a computer. The user datagram protocol or UDP is used to transmit simpler data into a computer.


Difference between connectionless and connection oriented communication?

Different from a connectionless protocol, a connection-oriented protocol guaranties the delivery of the information. An example of connection-oriented protocol is (TCP) and a connectionless protocol is (UDP). page/926 A+