answersLogoWhite

0


Best Answer

* Initiator sends connection request (w. id) * Responder sends accept or reject (w. id) * Responder assumes connection exists when it sends the ack * Initiator assumes connection exists when it receives the ack * OK if network service reliable and CO * If not? (consider lost, old conn reqs/ack)

User Avatar

Wiki User

14y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is 2 way handshake?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

Operates at the transport layer of the osi model and provides reliable data delivery services?

TCP The three way handshake verifies that data arrived


What does CHAP stands for in computer language?

Challange Handshake Authentication Protocol


What does a handshake mean when talking about computers?

In simple terms, it is the establishment of communication between computers. People can establish communication through a handshake, so the term is based on that. For computers to communicate they first must establish a connection with each other. It is like when you make a phone call and the other person answers, at which point communication has been established. One computer sends a message to the other and the other responds, opening a connection between them and that is what we call a handshake.


What is a handshake in networking?

There are two different handshakes, I'll go with the basic TCP one though. Say you have two different people. Sally and Bob Sally is the first host, and bob is the second host. Sally sends bob a synchronized message (SYN) which bob receives Bob then replies that he acknowledged it, synchronized-acknowledged (SYN-ACK) Sally then replies that she acknowledged the acknowledgement and bob doesn't reply.


Difference between serial line internet protocol and point to point protocol?

PPPis more secure than SLIP. PPP uses two authetication Protocols : 1. Password Authetication Protocol (PAP) 2. Challenge Handshake Authetication Protocol (CHAP) So if you use SLIP on network that unauthorized user can gain acces to.