Question

Why should file transport protocols compute a checksum on the file data they receive even when...

Why should file transport protocols compute a checksum on the file data they receive even when using a reliable end-to-end stream transfer protocol like TCP.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

First - CheckSum is not always possible, it depends on if the remote server supports the checksum, many do not.

Second - TCP will give reliability not integrity.

Let's assume,
-> Server sent us 10 packets
-> then our client will receive these packets
-> And will acknowledge back to the server that we received 10 packets

But it does not say that all 10 packets are exactly the same as they were sent.
Packets might have changed due to many reasons like,
-> Man in Middle attack
-> Or some other kind of interference

Checksum

-> After receiving all 10 packets
-> We will combine them and generate file

-> And Checksum
-> Which will generate a hash parameter

And if this generated hash parameter is exactly the same as the server provided hash parameter then we will know all 10 packets are not altered.

So, We use checksum for file integrity.
There are many methods use for checksum like,
MD5, SHA-1, SHA-256, and SHA-512....!

Add a comment
Know the answer?
Add Answer to:
Why should file transport protocols compute a checksum on the file data they receive even when...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Why should file transport protocols compute a checksum on the file data they receive even when...

    Why should file transport protocols compute a checksum on the file data they receive even when using a reliable end-to-end stream transfer protocol like TCP.

  • 1. Which of the following protocols is used by a client to send an email message?...

    1. Which of the following protocols is used by a client to send an email message? a. HTTP SMTP b. FTP d. RDP 2. What is the most common network topology today? a/Star c. Hub Ring d. Mesh 3. A client/server network is the simplest network model. a/ True O False 4. Which client server application allows an administrator to control a remote computer, but does not encrypt or secure the communication between client and server? A Telnet C. Remote...

  • Question 1 The size of the datagram is determined by the application that sends the data....

    Question 1 The size of the datagram is determined by the application that sends the data. Allowing the size of datagrams to vary makes IP adaptable to a variety of applications. True False Question 2 What is the conceptual network boundary, and where is it located within the protocol stack? Is the transition area between digital and analog signals and can be found between layer 2 and layer 3 of the protocol stack. Identifies application direct messaging and is formed...

  • In the last module you learned a formula for calculating bit rate, R = b/t, that...

    In the last module you learned a formula for calculating bit rate, R = b/t, that is the number of bits divided by the time. This formula expresses the number of bits that are transmitted over a circuit in a given period of time. In practice, however, we are not only concerned with the number bits transmitted, but also with the number of data bits transmitted over a circuit. The data bits are those that the sender decides to send...

  • PLEASE HELP WITH THESE COMPUTER NETWORK QUESTIONS THESE INCLUDE MCQS AND CALCULATIONS With reference to the...

    PLEASE HELP WITH THESE COMPUTER NETWORK QUESTIONS THESE INCLUDE MCQS AND CALCULATIONS With reference to the Go-Back-N and Selective repeat protocols, what does the window value signify? The packets that have already been ACKed The packets sent but remain unACKed The sequence numbers available and not yet sent The sequence numbers of packets not yet available None of the above 1 points    QUESTION 2 Which of the following is NOT a component of the TCP congestion control algorithm? Slow...

  • 1.DNS can not work if the hostnames are not hierarchal? Explain? 2. Give two scenarios where...

    1.DNS can not work if the hostnames are not hierarchal? Explain? 2. Give two scenarios where DNS protocols (from two hosts) gets two different IP address for the same hostname. 3. If you have a 100% reliable network layer, should you use TCP or UDP at the Transport layer? Explain your answer? 4.Is it is possible for an application on top of UDP to have a reliable data transfer? Explain? 5.Suppose that a Web server runs in Host C on...

  • I am studying the CCNA 200-125 books written by WENDELL ODOM. Here it talks about the...

    I am studying the CCNA 200-125 books written by WENDELL ODOM. Here it talks about the Link layer in TCP/IP model. Figure 1-11 shows four steps, in the first step Larry encapsulates the IP packet between an Ethernet header and Ethernet trailer, creating an Ethernet frame. Larry encapsulates the IP packet, what does this mean? Is it like compressing a file into a zip and compressing the IP packet into a frame? I've read the previous pages about the upper...

  • The input file should be called 'data.txt' and should be created according to the highlighted instructions...

    The input file should be called 'data.txt' and should be created according to the highlighted instructions below. Note that even though you know the name of the input file, you should not hard-code this name into your program. Instead, prompt the user for the name of the input file. The input file should contain (in order): the weight (a number greater than zero and less than or equal to 1), the number, n, of lowest numbers to drop, and the...

  • The input file should contain (in order): the weight (a number greater than zero and less...

    The input file should contain (in order): the weight (a number greater than zero and less than or equal to 1), the number, n, of lowest numbers to drop, and the numbers to be averaged after dropping the lowest n values. The program should also write to an output file (rather than the console, as in Horstmann). So you should also prompt the user for the name of the output file, and then print your results to an output file...

  • Write a program that will first receive as input the name of an input file and an output file. It will then read in a list of names, id #s, and balances from the input file specified (call it InFile.t...

    Write a program that will first receive as input the name of an input file and an output file. It will then read in a list of names, id #s, and balances from the input file specified (call it InFile.txt) which you will create from the data provided below. The program will then prompt the user for a name to search for, when it finds the name it will output to a file (call it OFile.txt) the person’s id#, name,...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT