Protocol in computer science #472510

di Aryan kanani

Master computers

(Ancora nessuna recensione) Scrivi una recensione
8,75€

Leggi l'anteprima

Security Aspect
For any protocol, keeping protection[5] is genuinely essential. If it does now no longer steady
facts transmission amongst, then there's no factor in the use of the protocol absolutely as it
does now no longer assure the right shipping of accurate facts to accurate receiver. There are
many protection assaults feasible on a community. The ones this protocol guards towards are:
1. Hello Flooding[6]: In this assault a unethical node sends a repeating message
thru the community inflicting community congestion. Our protocol offers with this
assault via way of means of associating a timestamp with each facts packet; if a facts packet, having
the equal timestamp[7] fee and equal supply node variety containing the equal
facts, is repeated then the receiving node will absolutely discard the facts packet.
2. Co-operative Black Hole assault [8]: In this assault a collection of cheating nodes act
as a black hollow, i.e., whilst a node gets a facts packet it circulates the packet
Aggiunta al carrello in corso… L'articolo è stato aggiunto

Con l'acquisto di libri digitali il download è immediato: non ci sono costi di spedizione

Altre informazioni:

Formato:
ebook
Editore:
Master computers
Anno di pubblicazione:
2020
Dimensione:
152 KB
Lingua:
Inglese
Autori:
Aryan kanani
Protezione:
watermark