answersLogoWhite

0


Best Answer

TCP

User Avatar

Wiki User

11y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What protocol ensures integrity of the communication?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

What is a reliable protocol?

A reliable protocol is one that ensures reliability properties with respect to the delivery of data to the intended recipients


What is a communication protocol?

a way for transmitting data form one computer to the another across a network is called as communication protocol


Communication on a network follows rules of communication called network?

protocol


Where are networks protocols located?

A network protocol is a set of rules, how to handle communication. These rules may be followed by the endpoints of a communication (computers, printers, etc.), or by intermediate pieces of equipment (switches, routers, etc.), or by both, depending on what particular protocol you are talking about.A network protocol is a set of rules, how to handle communication. These rules may be followed by the endpoints of a communication (computers, printers, etc.), or by intermediate pieces of equipment (switches, routers, etc.), or by both, depending on what particular protocol you are talking about.A network protocol is a set of rules, how to handle communication. These rules may be followed by the endpoints of a communication (computers, printers, etc.), or by intermediate pieces of equipment (switches, routers, etc.), or by both, depending on what particular protocol you are talking about.A network protocol is a set of rules, how to handle communication. These rules may be followed by the endpoints of a communication (computers, printers, etc.), or by intermediate pieces of equipment (switches, routers, etc.), or by both, depending on what particular protocol you are talking about.


What is the importance of Hypertext Transfer Protocol Secure?

The importance of the Hypertext Transfer Protocol Secure is that it ensures that a given connection is secure. This helps minimize the problem that is associated with hacking.?æ

Related questions

Can protocol is synchronous or asynchronous?

CAN protocol is synchronous, as it relies on a fixed timing mechanism for communication between nodes. This timing mechanism establishes when messages can be transmitted and ensures they arrive at the intended recipient without delays.


What is the Modbus communication protocol about?

The Modbus communication protocol is a simple and robust communication protocol to connect industrial electronic devices. It is easy to deploy and maintain.


What is a reliable protocol?

A reliable protocol is one that ensures reliability properties with respect to the delivery of data to the intended recipients


What is a communication protocol?

a way for transmitting data form one computer to the another across a network is called as communication protocol


Communication on a network follows rules of communication called network?

protocol


WTLS ensures integrity through what device?

Message authentication codes


How do you use protocol in a sentence?

When filing a complaint at my mom's work you must us the communication protocol.the communication classes can teach us protocol


This system of pathways used for communication and the protocol and methods used for transmission are collectively called the?

This system of pathways used for communication and the protocol and methods used for transmission are collectively called the bus. A protocol is a set of rules and standards that any two entities use for communication.


Mod What are the three key aspects of information assurance?

The three key aspects of information assurance are confidentiality, integrity, and availability. Confidentiality ensures that information is protected from unauthorized access. Integrity ensures that information is accurate and reliable. Availability ensures that information is accessible to authorized users when needed.


Explain the differences between entity integrity and referential integrity?

Entity integrity ensures that each row in a table is uniquely identifiable by a primary key, while referential integrity ensures that relationships between tables are accurately maintained when data is inserted, updated, or deleted. In essence, entity integrity concerns the uniqueness of data within a table, and referential integrity concerns the relationships between data across different tables.


What is proprietory protocol?

Proprietary protocol is a communication protocol owned by a single organization or individual. It is used in telecommunications. It does not comply to any open standards.


What is an agreed upon standard for communication on a computer?

A protocol.