Define byte stuffing, Computer Network Security

 

Sometimes the special character may see in data and as a part of data they will be misinterpreted as packet data. The solution to this cause is Byte stuffing.

 

In general to differentiate between data being sent and control information such as packet delimiters network systems arrange for the sending side to modify the data slightly before it is sent because systems generally insert bytes or data to modify data for transmission, the method is known as Data Stuffing.

There are two kinds of data stuffing:

  • Byte Stuffing
  • Bit Stuffing

Byte stuffing denotes stuffing with character oriented hardware and bit stuffing denotes to bit oriented hardware. Byte stuffing converts each reserved byte into two unreserved bytes. It may use esc as prefix followed by y for eot, x for soh and z for eco. The receiver then removes each occurrence of esc y, esc x and esc z by the corresponding single character. This is given in figure below:

 

647_Byte Stuffing.png

Byte stuffing is explained in another diagram below we can see the replacement of bytes.

 

 

1527_Byte Stuffing.png

Posted Date: 7/30/2012 5:42:13 AM | Location : United States







Related Discussions:- Define byte stuffing, Assignment Help, Ask Question on Define byte stuffing, Get Answer, Expert's Help, Define byte stuffing Discussions

Write discussion on Define byte stuffing
Your posts are moderated
Related Questions
what is relation ship between computer security goals?

Encryption Key Size When using ciphers, the size of crypto variable or key is quite important as the strength of many encryption applications and cryptosystems were measured by

Problem: (a) What is the minimum length of a password that could be considered to be "strong" in the context of today's computing power? (b) The security of a PIN system,

Divide the user data into 6 equal sets. Use the first set for the enrollment phase of your system, and the rest for the verification phase. Use the following formula to calculate t

Problem a) Give three reasons why traditional Network Design approach is less appropriate for many of today's networks? b) The network requires of users are organized into m

In this work a network intrusion system (package) must implement based on high interaction honeypots. There are two honeypots with different platforms (ubuntu and windows server 20

Problem (1) - Alice, Bob and Charlie have a secret key a=3, b=4, c=5, respectively. - They want to find a common secret key using Diffie-Hellan key exchange protocol (with g

Q. What is Triple Key Management Scheme? The triple key management mechanism provides optimum security by enabling the use of two pre-deployed keys for each of the WS nodes, an

Information asset classification-risk management A number of organizations have data classification schemes (for instance confidential, internal, public data). The classificat

QUESTION Testing of a Business Continuity Plan (BCP) does not need to be costly or to interrupt the daily operations of the business. The result of the test should also be look