StudentShare solutions
Triangle menu

Computer networking and management - Essay Example

Nobody downloaded yet
The protocol constitutes two layers; one is the TLS Record Protocol and the other is TLS handshake protocol.
Netgear (2005) further discusses that TLS Record Protocol is a layered protocol. There are different contents for messages at every layer; messages may contain fields for length or details about the message. Record Protocol performs a series of functions; takes the data/message which is desired to be transmitted to the other end, divides the data into smaller blocks, performs the compression function on the data if needed, applies a MAC and encrypts the message according to it and then finally transmits the result. The data which is received at the target server is decrypted, then verified if it has come from the expected host, decompressed and finally passed onto the target host. TLS Record has two main properties, which are discussed below:
Connection between the two communicating entities is private. The technique that is used for data encryption is symmetric cryptography. The connection is secure because the key for this symmetric cryptography is unique for every connection, which is communicated between the two connecting applications by another protocol- TLS Handshake Protocol. If security of the connection can be compromised then it is possible to utilize the Record Protocol without encryption.
Another characteristic about the protocol is that it provides a reliable connection; this is possible due to the provision of a message integrity check which works on a keyed MAC. The security of MAC is ensured by computing it with a secure hash functions.
TLS Handshake Protocol gives a medium for the client and server to authenticate each other and to decide an encryption algorithm. Cryptographic keys are also negotiated among the two applications before any data is transferred or received by either. The steps for TLS handshake protocol are defined in the figure below;
The negotiation process of the encryption algorithm is also secure therefore ...Show more


Sundaram, A., (1996), An Introduction to Intrusion Detection, Association for Computing Machinery, Available from:, [Accessed Feb 5, 2010] 37
Dierks (1999) described that transport layer security protocol is meant to…
Author : mcculloughjulia
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Computer networking and management"
with a personal 20% discount.
Grab the best paper

Check these samples - they also fit your topic

Computer applications in management
This has its benefits and challenges as discussed below. Mass media has gradually replaced interpersonal communication as a socializing force as explained by Benniger (1987). Social networking sites are popular sites for youth culture where they explore themselves ranging from relationships and share cultural artifacts.
5 pages (1250 words) Essay
Networking and Management
Computer networks vary in size. Some networks are needed for areas within a single office, while others are vast or even span the globe. Network management has grown as a career that requires specialized training, and comes with management of important responsibilities, thus creating future opportunities for employment.
20 pages (5000 words) Essay
Computer Networking and Management Essay
The computers on the private network under an 80 technology will be configured with reusable private Internet protocol version 4 addresses (Ipv4). On a global network computers are usually configured with globally unique Ipv4 addresses but this can sometimes be Internet protocol version 6 (Ipv6) addresses.
28 pages (7000 words) Essay
Computer Networking Essay
In simplest terms, "a network is nothing more than two or more computers connected to each other so that they can exchange information such as email messages or documents or share resources such as disk storage or printers" ( Lowe, 9). These computers can be placed in two different buildings, different cities or even different countries.
8 pages (2000 words) Essay
Computer Networking Management
These device mappers are arranged in a hierarchical structure to show a family or functional relationship between the devices. Functions that will be executed by given devices are expressed as multiple executable program components. In reality, each organization is different and different computer networks must be developed to fit any particular organization and its structure.
22 pages (5500 words) Essay
Computer Networking
Empirical indicators that can be used to measure the 'health' of IT usage within the company can be achieved with the policy, as it can increase the company's security; maintain consistent and reliable processes; as well as ensure less idle time, and less waste of materials and staff efforts.
9 pages (2250 words) Essay
Computer Networking and Management
By contrast, in a private-key cryptography (also called secret-key cryptography), the private keys are required to be transmitted (either
8 pages (2000 words) Essay
Computer networking and management
The advent of sophisticated, packet-level network-management tools allow administrators to determine the types of traffic flowing across their networks, and create security and
20 pages (5000 words) Essay
Computer Networking
are continuously growing but there still have some of the key challenges in wireless networks that are security, radio signal interference, system interoperability and many other bases. Now many improved standards are introduced by IEEE. Attackers try unauthorised attempts to
1 pages (250 words) Essay
Networking in simple words can be explained as the process of establishing communication between two or more computer nodes within a same facility, locality or within
9 pages (2250 words) Essay
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
Comments (0)
Click to create a comment
Let us find you another Essay on topic Computer networking and management for FREE!
Contact us:
Contact Us Now
  • About StudentShare

  • Testimonials

  • FAQ

  • Blog

  • Free Essays
  • New Essays
  • Essays

  • The Newest Essay Topics
Join us:
Contact Us