digital signature : Information that is encrypted with an entity private key and is appended to a message to assure the recipient of the authenticity and integrity of the message. The digi...
HIwhen the server want to send some packect to diffrent Network .then they go to gatways(router) and after that Router check Routing table and send the packet to destination if address is present if not then discard
K.Shridhar
Mar 20th, 2006
Hi, When data goes through the server the first step is that it will check the gateway ip address means network main router IP if this will correct then the nexp porcess is done by router itselef...
E1 Cercuit is used for long distance Calls / data transfer. E1 has 0-31 channels out of them 0 and 16 are used for signaling. IF E1 use for data transfer we can get bendwidth of 2MBPS or if for voice or voip 30 Chennalls. Dixit Bhavsar
RSA uses PKI that is correct - for authentication RSA is used int he form of X.509 Certificate.? Your answer of using Hash/Digital Signature is the answer if the question was "non-repudiation"
RSA is based upon public key/private key concept. For authentication one can encrypt the hash (MD5/SHA) of the data with his private key. This is known as digital signature. And secrecy is achieved b...
We can implement the above situation if we have a global-nat statement configured on the firewall. This way, we would differentiate the security levels between inside and outside and would permit free...
A rackmounting kit can be mounted in a rack and it comes with all accesories to mount in the rack. A stand alone unit cannot be mounted in rack. This would be placed on a desk.
tracert is a network tool used to determine the route taken by packets across the network.Tracert works by increasing the TTL value of each successive batch of packets sent. The first 3 packets have a...
See traceroute works using ICMP packets. First source sends an ICMP packet with Time to Live (TTL) field as 1 to the destination address. Now intermediate router receives the packet and sees that TTL ...
MD5 is a cryptographic hash function with a 128-bit hash value output. It is used to check the integrity of files/input. An MD5 hash is expressed as a 32-character hex number.It takes the variable-len...
The following are the routing protocols:- IS-IS runs over the data link layer- OSPF, IGRP, and EIGRP run directly over IP; OSPF and EIGRP have their own reliable transmission mechanism while IGRP assumed an unreliable transport- RIP runs over UDP- BGP runs over TCPThanks.
Discretionary Access Control is a means to restrict access to objects based on the identity of subjects and/or groups to which the objects belong.Mandatory Access Control is a means to restrict access...
girish
Oct 27th, 2005
Das is used by itself according to it it is access and comtrolled while mas it has to be compulsory give the access controll.
A Broadcast domain is a logical network segment in which the traffic is transmitted out to all the connected network devices, provided that the devices share the same subnet and are in the same VLAN.R...
Kumar Sudeep
Jun 30th, 2006
COLLISISON DOMAINA collision domain is a logical area in a computer netwerk where date packets can collied with one another , in particuler in the ethernet network protocol.BROADCAST DOMAINA broadcast...
Single sign-on (SSO) is a method of access control that enables a user to authenticate once and gain access to multiple resources over the network.Thanks.
Robert K
Oct 8th, 2005
Single sign-on (SSO) is mechanism whereby a single action of user authentication and authorization can permit a user to access all computers and systems where he has access permission, without the nee...
A Socket is a communication end-point unique to a machine communicating on an IP-based network. A socket is composed of:a. Protocol - TCP / UDP / raw IPb. Local IP address. Local Portd. Remote IP addr...
Prithvi
Dec 17th, 2006
The Socket is a Combination of Ip address and Port Number (in pairs)Session is a Logical Connectivity between the source and destination
We can create multiple Vlans even in layer 2 switch environment eg we make 4 Vlans in a 24 ports switch it will give us 8 port per Vlan .This will give us 4 broadcast domains.So less broadcast traffic is used.Secondly why use HUB? use switches as a 24 port switch is 24 collision domain.Thanks
satwinder Singh
Jan 25th, 2007
there should be a smaller collision domain to have a efficient network. to create a smaller collision domain we can use sub-netting of ip's address. to make network more efficient we can use routers/...
OSPF stands for Open shortest path first. It is a link state protocol which use hello protocol(default hello timer is 10 secs. & dead interval is 40 secs on multi access networks.)to make the neighbou...
kalpit
Jul 22nd, 2006
(a) OSPF has two primary characteristics. The first is that the protocol is open, which means that its specification is in the public domain. The OSPF specification is published as Request For Comment...
Traceroute is based on ICMP type 30 under Windows and UDP under *NIX; traceroute pacjets that would hit the firewall should be dropped similarly any echo replay coming from inside the firewall should ...
Short question ...long answer...Traceroute is using ICMP(type 30) under Windows and UDP under *NIX. To be able to use traceroute via a firewall the firewall needs to allow echo replies/requests. The w...
Fundamental purpose: 1)Routers are designed to route traffic, not stop it.2)Firewalls are designed to examine and accept/reject traffic. But the both ACL are do the same job. Depending upon our requirments we do our ACL configuration on it.
Ans