Define byte stuffing, Computer Network Security

 

Sometimes the special character may see in data and as a part of data they will be misinterpreted as packet data. The solution to this cause is Byte stuffing.

 

In general to differentiate between data being sent and control information such as packet delimiters network systems arrange for the sending side to modify the data slightly before it is sent because systems generally insert bytes or data to modify data for transmission, the method is known as Data Stuffing.

There are two kinds of data stuffing:

  • Byte Stuffing
  • Bit Stuffing

Byte stuffing denotes stuffing with character oriented hardware and bit stuffing denotes to bit oriented hardware. Byte stuffing converts each reserved byte into two unreserved bytes. It may use esc as prefix followed by y for eot, x for soh and z for eco. The receiver then removes each occurrence of esc y, esc x and esc z by the corresponding single character. This is given in figure below:

 

647_Byte Stuffing.png

Byte stuffing is explained in another diagram below we can see the replacement of bytes.

 

 

1527_Byte Stuffing.png

Posted Date: 7/30/2012 5:42:13 AM | Location : United States







Related Discussions:- Define byte stuffing, Assignment Help, Ask Question on Define byte stuffing, Get Answer, Expert's Help, Define byte stuffing Discussions

Write discussion on Define byte stuffing
Your posts are moderated
Related Questions
Question (a) In relation to a TCP segment structure, provide the fields responsible for: i. Connection Management ii. Flow Control iii. Error Control iv. Reliable, in-order

A  full-duplex (FDX) , accepts communication in both ways, and, unlike half-duplex, accept this to occur simultaneously. Land-line telephone networks are full-duplex, since they

Types of IDSs and Detection Methods IDSs operate as network based, host based, or application based systems and focused on protecting network information assets. All the IDSs us

"Using the CNSS Model, examine each of the cells and write a brief statement on how you would address the components respesented in that cell"

B-Router Hybrid devices that has the features of both routers and bridges . A bridge router or brouter is a network machine that acts as a router and as a bridge. The brout

QUESTION a) Compare and contrast between static and dynamic routing. b) What are the merits (five merits) and limitations (3 limitations) of using Open Shortest Path First

Attacker's Motives behind the Cyber Attack Before adapting the necessary measures to deal with the problem, understanding and evaluating the blogger's psyche and his motivation

Question: (a) Explain briefly the PCI Control Objectives which enterprises must meet to be compliant with the Payment Card Industry Data Security Standard (PCI DSS). Specify a

QUESTION a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a segment. Give the source MAC address in hexadecimal; the source IP address, the uppe

QUESTION (a) (i) Describe Phishing attacks. (ii) Distinguish between Phishing and Spear Phishing attacks. (b) Describe two instances where an attacker sniffing on a netwo