StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Computer networking and management - Essay Example

Cite this document
Summary
Sundaram, A., (1996), An Introduction to Intrusion Detection, Association for Computing Machinery, Available from: http://www.acm.org/crossroads/xrds2-4/intrus.html#ref1#ref1, [Accessed Feb 5, 2010] 37
Dierks (1999) described that transport layer security protocol is meant to…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.5% of users find it useful
Computer networking and management
Read Text Preview

Extract of sample "Computer networking and management"

Download file to see previous pages

The protocol constitutes two layers; one is the TLS Record Protocol and the other is TLS handshake protocol. Netgear (2005) further discusses that TLS Record Protocol is a layered protocol. There are different contents for messages at every layer; messages may contain fields for length or details about the message. Record Protocol performs a series of functions; takes the data/message which is desired to be transmitted to the other end, divides the data into smaller blocks, performs the compression function on the data if needed, applies a MAC and encrypts the message according to it and then finally transmits the result.

The data which is received at the target server is decrypted, then verified if it has come from the expected host, decompressed and finally passed onto the target host. TLS Record has two main properties, which are discussed below: Connection between the two communicating entities is private. The technique that is used for data encryption is symmetric cryptography. The connection is secure because the key for this symmetric cryptography is unique for every connection, which is communicated between the two connecting applications by another protocol- TLS Handshake Protocol.

If security of the connection can be compromised then it is possible to utilize the Record Protocol without encryption. Another characteristic about the protocol is that it provides a reliable connection; this is possible due to the provision of a message integrity check which works on a keyed MAC. The security of MAC is ensured by computing it with a secure hash functions. TLS Handshake Protocol gives a medium for the client and server to authenticate each other and to decide an encryption algorithm.

Cryptographic keys are also negotiated among the two applications before any data is transferred or received by either. The steps for TLS handshake protocol are defined in the figure below; The negotiation process of the encryption algorithm is also secure therefore

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer networking and management Essay Example | Topics and Well Written Essays - 6500 words”, n.d.)
Computer networking and management Essay Example | Topics and Well Written Essays - 6500 words. Retrieved from https://studentshare.org/miscellaneous/1562603-computer-networking-and-management
(Computer Networking and Management Essay Example | Topics and Well Written Essays - 6500 Words)
Computer Networking and Management Essay Example | Topics and Well Written Essays - 6500 Words. https://studentshare.org/miscellaneous/1562603-computer-networking-and-management.
“Computer Networking and Management Essay Example | Topics and Well Written Essays - 6500 Words”, n.d. https://studentshare.org/miscellaneous/1562603-computer-networking-and-management.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer networking and management

Data Communication and Networking

This computing technique gave birth to the modern form of networking and the concepts of "client" and "server".... The author concludes that networking may continue to expand to the extent where you may actually be able to use the webcam placed in your refrigerator to check whether you need any milk while coming home from the office.... Such will be the power and importance of networking in the years to come.... In addition, networking also helps in reducing the cost of saving work in different soft copies and hard copies since it allows the sharing of work....
8 Pages (2000 words) Term Paper

Computer networking

The report also addresses the technical concepts of implementing computer networking and also emphasizes… The most prevalent norms of computer networking applications and type are addressed in the end. The onset of the digital age was like embarking upon a journey full of inventions and transformations for the human race.... More specifically addressing computer networking, the report revolves around the core concept of the said issue.... The basis of it all however lies in the fact that it mainly is computer networking that enables the establishment of this connectivity....
4 Pages (1000 words) Research Paper

Highlighting the Need to Have Proper Computer Networking Standards

nbsp;… I agree that networking with the company's operations and management using computers is paramount.... tHE ESSAY "Highlighting the Need to Have Proper computer networking Standards " presents the author's statement.... It says: I am writing to respond to a memo dated June 26th, 2014 on the subject, “Highlighting the need to have proper computer networking standards followed in the company.... his is in response to memo 2 titled, “computer networking Standards Recommendation” dated on June 26th, 2014....
1 Pages (250 words) Essay

Marketing of Communications and Networking Company

This paper is discussing of a market case for a company that deals with communications and networking.... This company wishes to purchase more computers from a computer supplying company.... nbsp;The issue is about expansion of computer services in their company in order to meet the increasing customer demands....
2 Pages (500 words) Case Study

Evolution of Computer Networks and Their Improvement

The term computer network is used to refer to a network that is based on the system of telecommunications and it enables more than one computer to share and transfer data with other computers and this is why it is even recognized as data network.... The data is communicated between… computer networks have evolved over the past 65 years and have several uses.... computer networks came into existence during the period of 1950s and today computer networks Initially computer networks were used for military purposes, but today every a huge population of individuals as well as businesses use computer networks to communicate with each other....
8 Pages (2000 words) Essay

Understanding Networking

It has a wide range of uses and holds the credibility of fast communication or transfer of information is all based on networking and its advancement with Excellency.... This report "Understanding Networking" discusses computer networking that plays a major role in building up a structure for communication and data transfer.... In this fast era, where millions of works are getting done on computers, computer networking is a source to make it more reliable....
6 Pages (1500 words) Report

Cons and Pros of Peer to Peer Networking

The essay "Cons and Pros of Peer to Peer networking" discusses such benefits as lack of a centralized administration and centralized server that reduces bottlenecks that would rather cause a clog up in communication.... hellip; Peer to peer networking is also called peer networking, it allows for each computer to act as both client and server.... Peer to peer networking is made when two or more PCs are connected without necessarily going through a separate server computer....
5 Pages (1250 words) Essay

A Computer Network as a group of Computers Linked Together

computer networking involves the integration of various computers through wireless connections or through the use of cabling systems.... computer networking involves the integration of various computers through wireless connections or through the use of cabling systems.... Additionally, the organization seeks to improve information sharing between branches so as to integrate the various departments of each branch with the central management.... Network Designs/ Topologies The management of the hotel can determine the topology to adapt depending on the nature of information sharing....
6 Pages (1500 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us