Define byte stuffing, Computer Network Security

 

Sometimes the special character may see in data and as a part of data they will be misinterpreted as packet data. The solution to this cause is Byte stuffing.

 

In general to differentiate between data being sent and control information such as packet delimiters network systems arrange for the sending side to modify the data slightly before it is sent because systems generally insert bytes or data to modify data for transmission, the method is known as Data Stuffing.

There are two kinds of data stuffing:

  • Byte Stuffing
  • Bit Stuffing

Byte stuffing denotes stuffing with character oriented hardware and bit stuffing denotes to bit oriented hardware. Byte stuffing converts each reserved byte into two unreserved bytes. It may use esc as prefix followed by y for eot, x for soh and z for eco. The receiver then removes each occurrence of esc y, esc x and esc z by the corresponding single character. This is given in figure below:

 

647_Byte Stuffing.png

Byte stuffing is explained in another diagram below we can see the replacement of bytes.

 

 

1527_Byte Stuffing.png

Posted Date: 7/30/2012 5:42:13 AM | Location : United States







Related Discussions:- Define byte stuffing, Assignment Help, Ask Question on Define byte stuffing, Get Answer, Expert's Help, Define byte stuffing Discussions

Write discussion on Define byte stuffing
Your posts are moderated
Related Questions
Question requires you to produce a pcap file from a Wireshark capture.  In addition, you must include a screen capture of Wireshark and some specific information regarding the fram

QUESTION 1 Risk analysis helps companies prioritize their risks and shows management the amount of money that should be applied to protecting against those risks in a sensib

Q. Develop a completely secure WSN based on the triple key? Wireless network is the most vulnerable type of network to security attack. Unauthorized access to wireless network


Question: (a) What is Network Address Translation (NAT)? Why is it used? (b) Given a following information by your ISP about your newly acquired Frame Relay connection:

Guided Media These are those that give a conduit from one machine to another that add twisted-pair, fiber-optic cable and coaxial cable. A signal traveling along any of these

Describe the salient features of the multimedia. Also explain the applications of it. Multimedia can be understood as follows: Multimedia is on the whole a media which makes

Question : (a) What is an IDS and what is the basic problem it faces which can be solved by Artificial Intelligence. (b) Identify and describe briefly an Artificial Intell

All references using actual quotes, paraphrase, or specific arguments, should employ page numbers. The essay is based on the unit content and should engage with the set readings, a

QUESTION (a) Which PKI (Public Key Infrastructure) model is typically favored by business organization? (b) Give one possible use of the "extensions" field of an X.509 certi