ITM 820 Study Guide - Midterm Guide: Digital Signature, Forwarding Information Base, Buffer Overflow

278 views8 pages

Document Summary

Encryption: only the receiver can get the message. Receiving side needs to know two things: key, algorithm. 1010 -> 1x2^3 + 0x2^2 + 1x2^1 + 0x2^0. Note: 732 itself is referring to decimal number system if base not given. 8 symbols (0,1,7) (3,7,2) 8-> 3x8^2 + 7x8^1 + 2x8^0. 17b 16 = (1x16^2 + 7x16^2 + 11x16^0)10. Or operation - if you have a 1 the result is 1. And operation - if you have 0 then the result is 0 (multiplication) 7- application - user interface to interact with the network. 4- transport - works at the source and destination only - error checking and no packet missing. uses sequence number. identifies if something is missing. flow control. 2- data link - mac, mac table, switch. 1- physical - hub, 8 wire twisted pair, network card. Mechanism - encryption mechanism is used to achieve confidentiality. G = receiver, machine that opens the garage.