We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

Computer networking and management - Essay Example

Comments (0)
Sundaram, A., (1996), An Introduction to Intrusion Detection, Association for Computing Machinery, Available from: http://www.acm.org/crossroads/xrds2-4/intrus.html#ref1#ref1, [Accessed Feb 5, 2010] 37
Dierks (1999) described that transport layer security protocol is meant to…
Download full paper
Computer networking and management
Read TextPreview

Extract of sample
Computer networking and management

Download file to see previous pages... The protocol constitutes two layers; one is the TLS Record Protocol and the other is TLS handshake protocol.
Netgear (2005) further discusses that TLS Record Protocol is a layered protocol. There are different contents for messages at every layer; messages may contain fields for length or details about the message. Record Protocol performs a series of functions; takes the data/message which is desired to be transmitted to the other end, divides the data into smaller blocks, performs the compression function on the data if needed, applies a MAC and encrypts the message according to it and then finally transmits the result. The data which is received at the target server is decrypted, then verified if it has come from the expected host, decompressed and finally passed onto the target host. TLS Record has two main properties, which are discussed below:
Connection between the two communicating entities is private. The technique that is used for data encryption is symmetric cryptography. The connection is secure because the key for this symmetric cryptography is unique for every connection, which is communicated between the two connecting applications by another protocol- TLS Handshake Protocol. If security of the connection can be compromised then it is possible to utilize the Record Protocol without encryption.
Another characteristic about the protocol is that it provides a reliable connection; this is possible due to the provision of a message integrity check which works on a keyed MAC. The security of MAC is ensured by computing it with a secure hash functions.
TLS Handshake Protocol gives a medium for the client and server to authenticate each other and to decide an encryption algorithm. Cryptographic keys are also negotiated among the two applications before any data is transferred or received by either. The steps for TLS handshake protocol are defined in the figure below;
The negotiation process of the encryption algorithm is also secure therefore ...Download file to see next pagesRead More
Comments (0)
Click to create a comment or rate a document
Computer applications in management
This has its benefits and challenges as discussed below. Mass media has gradually replaced interpersonal communication as a socializing force as explained by Benniger (1987). Social networking sites are popular sites for youth culture where they explore themselves ranging from relationships and share cultural artifacts.
5 Pages(1250 words)Essay
Networking and Management
Computer networks vary in size. Some networks are needed for areas within a single office, while others are vast or even span the globe. Network management has grown as a career that requires specialized training, and comes with management of important responsibilities, thus creating future opportunities for employment.
20 Pages(5000 words)Essay
Computer Networking and Management Essay
The computers on the private network under an 80 technology will be configured with reusable private Internet protocol version 4 addresses (Ipv4). On a global network computers are usually configured with globally unique Ipv4 addresses but this can sometimes be Internet protocol version 6 (Ipv6) addresses.
28 Pages(7000 words)Essay
Computer Networking Essay
In simplest terms, "a network is nothing more than two or more computers connected to each other so that they can exchange information such as email messages or documents or share resources such as disk storage or printers" ( Lowe, 9). These computers can be placed in two different buildings, different cities or even different countries.
8 Pages(2000 words)Essay
Computer Networking Management
These device mappers are arranged in a hierarchical structure to show a family or functional relationship between the devices. Functions that will be executed by given devices are expressed as multiple executable program components. In reality, each organization is different and different computer networks must be developed to fit any particular organization and its structure.
22 Pages(5500 words)Essay
Computer Networking
Empirical indicators that can be used to measure the 'health' of IT usage within the company can be achieved with the policy, as it can increase the company's security; maintain consistent and reliable processes; as well as ensure less idle time, and less waste of materials and staff efforts.
9 Pages(2250 words)Essay
Computer Networking and Management
By contrast, in a private-key cryptography (also called secret-key cryptography), the private keys are required to be transmitted (either
8 Pages(2000 words)Essay
Computer networking and management
The advent of sophisticated, packet-level network-management tools allow administrators to determine the types of traffic flowing across their networks, and create security and
20 Pages(5000 words)Essay
Computer Networking
are continuously growing but there still have some of the key challenges in wireless networks that are security, radio signal interference, system interoperability and many other bases. Now many improved standards are introduced by IEEE. Attackers try unauthorised attempts to
1 Pages(250 words)Essay
Networking in simple words can be explained as the process of establishing communication between two or more computer nodes within a same facility, locality or within
9 Pages(2250 words)Essay
Let us find you another Essay on topic Computer networking and management for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us