answersLogoWhite

0


Best Answer

TCP

User Avatar

Wiki User

11y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What protocol ensures integrity of the communication?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

What is a reliable protocol?

A reliable protocol is one that ensures reliability properties with respect to the delivery of data to the intended recipients


What is a communication protocol?

a way for transmitting data form one computer to the another across a network is called as communication protocol


Communication on a network follows rules of communication called network?

protocol


Where are networks protocols located?

A network protocol is a set of rules, how to handle communication. These rules may be followed by the endpoints of a communication (computers, printers, etc.), or by intermediate pieces of equipment (switches, routers, etc.), or by both, depending on what particular protocol you are talking about.A network protocol is a set of rules, how to handle communication. These rules may be followed by the endpoints of a communication (computers, printers, etc.), or by intermediate pieces of equipment (switches, routers, etc.), or by both, depending on what particular protocol you are talking about.A network protocol is a set of rules, how to handle communication. These rules may be followed by the endpoints of a communication (computers, printers, etc.), or by intermediate pieces of equipment (switches, routers, etc.), or by both, depending on what particular protocol you are talking about.A network protocol is a set of rules, how to handle communication. These rules may be followed by the endpoints of a communication (computers, printers, etc.), or by intermediate pieces of equipment (switches, routers, etc.), or by both, depending on what particular protocol you are talking about.


What is the importance of Hypertext Transfer Protocol Secure?

The importance of the Hypertext Transfer Protocol Secure is that it ensures that a given connection is secure. This helps minimize the problem that is associated with hacking.?æ

Related questions

What is the Modbus communication protocol about?

The Modbus communication protocol is a simple and robust communication protocol to connect industrial electronic devices. It is easy to deploy and maintain.


What is a reliable protocol?

A reliable protocol is one that ensures reliability properties with respect to the delivery of data to the intended recipients


WTLS ensures integrity through what device?

Message authentication codes


What is a communication protocol?

a way for transmitting data form one computer to the another across a network is called as communication protocol


Communication on a network follows rules of communication called network?

protocol


Mod What are the three key aspects of information assurance?

The three key aspects of information assurance are confidentiality, integrity, and availability. Confidentiality ensures that information is protected from unauthorized access. Integrity ensures that information is accurate and reliable. Availability ensures that information is accessible to authorized users when needed.


How do you use protocol in a sentence?

When filing a complaint at my mom's work you must us the communication protocol.the communication classes can teach us protocol


Can protocol is synchronous or asynchronous?

CAN Protocol uses asycnchronous communication. It is high speed 1 Mbps, short distance protocol.


Explain the differences between entity integrity and referential integrity?

Entity integrity ensures that each row in a table is uniquely identifiable by a primary key, while referential integrity ensures that relationships between tables are accurately maintained when data is inserted, updated, or deleted. In essence, entity integrity concerns the uniqueness of data within a table, and referential integrity concerns the relationships between data across different tables.


What security ensures that only authorized individuals are able to create or change information?

Integrity


How can referential integrity be enforced in an object-oriented system in uml?

Referential integrity in an object-oriented system can be enforced using UML by defining associations between classes with multiplicity constraints. By specifying these constraints (such as 1 to 1, 1 to many, etc.), you ensure that instances of one class are properly connected to instances of another class. This helps to maintain data consistency and integrity within the system.


This system of pathways used for communication and the protocol and methods used for transmission are collectively called the?

This system of pathways used for communication and the protocol and methods used for transmission are collectively called the bus. A protocol is a set of rules and standards that any two entities use for communication.