Define byte stuffing, Computer Network Security

 

Sometimes the special character may see in data and as a part of data they will be misinterpreted as packet data. The solution to this cause is Byte stuffing.

 

In general to differentiate between data being sent and control information such as packet delimiters network systems arrange for the sending side to modify the data slightly before it is sent because systems generally insert bytes or data to modify data for transmission, the method is known as Data Stuffing.

There are two kinds of data stuffing:

  • Byte Stuffing
  • Bit Stuffing

Byte stuffing denotes stuffing with character oriented hardware and bit stuffing denotes to bit oriented hardware. Byte stuffing converts each reserved byte into two unreserved bytes. It may use esc as prefix followed by y for eot, x for soh and z for eco. The receiver then removes each occurrence of esc y, esc x and esc z by the corresponding single character. This is given in figure below:

 

647_Byte Stuffing.png

Byte stuffing is explained in another diagram below we can see the replacement of bytes.

 

 

1527_Byte Stuffing.png

Posted Date: 7/30/2012 5:42:13 AM | Location : United States







Related Discussions:- Define byte stuffing, Assignment Help, Ask Question on Define byte stuffing, Get Answer, Expert's Help, Define byte stuffing Discussions

Write discussion on Define byte stuffing
Your posts are moderated
Related Questions
(a) Describe RSA encryption. (b) For an RSA encryption the values of the primes are: p=29, q=31. select e=11, evaluate the public and private keys. (c) How can RSA be used fo

Let me know the details of protocol tcp/ip

Computer networks are defined by four factors which are as given below: 1) NETWORK SIZE: According to the size of networks. 1) Local Area Network ( LAN) 2) Wide Area Ne

doing coursework in Network Security to present a possible solution to the problem at hand by creating a prototype of the new network security infrastructure. This new design shou

Thinking ethically is difficult without a background in moral philosophy. Asking people to embrace ethics without offering practical explanation of the efficacy of so doing, is a t

FRAGMENTATION One method is to limit datagram size to smallest MTU of any server. IP needs fragmentation i.e. datagrams can be divided into pieces to fit in network with small

Vulnerability Identification Specific avenues threat agents can exploit to attack an information asset are known as vulnerabilities. Examine how each threat can be generated and

All references using actual quotes, paraphrase, or specific arguments, should employ page numbers. The essay is based on the unit content and should engage with the set readings, a

SDLC Systems development life cycle (SDLC) is process of developing information systems through analysis, design, investigation, implementation and maintenance. SDLC is called as

Question An organization is planning to connect its networks to the Internet. The network is located within a four story building. A web server supporting online sales is also