answersLogoWhite

0

They allow stations to reserve resources during the establishment of connections

User Avatar

Wiki User

13y ago

What else can I help you with?

Related Questions

What makes connection-oriented services vulnerable to denial of service attacks?

They allow stations to reserve resources during the establishment of connections


What is the differences between connection-oriented services and connectionless services?

In general, transport protocols can be characterized as being either connection-oriented or connectionless. Connection-oriented services must first establish a connection with the desired service before passing any data. A connectionless service can send the data without any need to establish a connection first. In general, connection-oriented services provide some level of delivery guarantee, whereas connectionless services do not. Connection-oriented service involves three phases: connection establishment, data transfer, and connection termination. During connection establishment, the end nodes may reserve resources for the connection. The end nodes also may negotiate and establish certain criteria for the transfer, such as a window size used in TCP connections. This resource reservation is one of the things exploited in some denial of service (DOS) attacks. An attacking system will send many requests for establishing a connection but then will never complete the connection. The attacked computer is then left with resources allocated for many never-completed connections. Then, when an end node tries to complete an actual connection, there are not enough resources for the valid connection. The data transfer phase occurs when the actual data is transmitted over the connection. During data transfer, most connection-oriented services will monitor for lost packets and handle resending them. The protocol is generally also responsible for putting the packets in the right sequence before passing the data up the protocol stack. When the transfer of data is complete, the end nodes terminate the connection and release resources reserved for the connection. Connection-oriented network services have more overhead than connectionless ones. Connection-oriented services must negotiate a connection, transfer data, and tear down the connection, whereas a connectionless transfer can simply send the data without the added overhead of creating and tearing down a connection. Each has its place in internetworks.


What are two ways to make a switch less vulnerable to attacks like MAC address flooding CDP attacks and Telnet attacks?

I might be wrong, but I think Enable CDP on the switch and Turn off unnecessary services.


What country do you think are vulnerable to attack?

Any country that does not have a Military or Ministry of Defense are potentially vulnerable to attacks.


What country do you think are vulnerable to attack now?

Any country that does not have a Military or Ministry of Defense are potentially vulnerable to attacks.


Can you list two ways to prevent vulnerable software attacks?

Two ways to prevent vulnerable software attacks include using a high quality anti virus that helps detect theses attacks and only using trusted websites and software.


How do you use the word vulnerable in a sentence?

I felt vulnerable because the door could not be locked. The outlying parts of the empire proved vulnerable to attacks by enemies. With proper protection, a computer is vulnerable to viruses and other malware.


Why are giraffes vulnerable to lion attacks?

Because lions are stronger and much better than giraffes


Why was the catholic church vulnerable to attacks by Muslims in medieval times?

because they practiced catholicism and not islam


How Mono affects the body?

it attacks your immune system and makes u more vulnerable to viruses.


Is Javascript a vulnerable web based application?

It is a client side script essentially and they are always vulnerable to attacks. If a person can see the code then he can make changes to it both good and bad


Is Gmail vulnerable to cyber attacks?

Being famous, yes Gmail is vulnerable. Hackers always try to hack the most secure things. It has been attacked a number of times in the past.