How does a packet travel across the Internet from A to B?
Asked in Computer Networking
What part of the cdv packet contains data that is being sent?
Asked in Genetics
What moves water through a semipermeable membrane?
Asked in Computer Networking
Which layers of the OSI model does B channel use to transfer packet data?
Is line efficiency greater in packet switching?
The short answer is "no." The longer answer is that "packet switching" is the way the internet works. If you send a very short message, it might end up as a single "packet." A packet consists of a sandwich that contains your message as the filling. The beginning contains routing information - where you want the message to go, and eventually where the message has been (how many stops it made along the way and what their address is). The end contains information to keep the message "clean" and be sure we don't drop some words or letters, or add some. If your message is long, it will probably be divided into several packets, and each packet is identified with a unique message identifier showing it is your message in a number of pieces and a sequence within the message. Each packet is then sent out over the internet. Each packet will probably follow a different route through the internet, stopping at different places along the way to the destination. At the destination, the receiving machine will recognize that a packet is part of a bigger message, and store it until all the parts are received. It will then assemble it as a single message and pass it on to your application, usually your internet browser such as Internet Explorer or Firefox. So...a line is more efficient when you fill it with large blocks of data. When you use packets you are duplicating a lot of information in each packet, and generating information to identify the packet and the data within it. Therefore, packets are inherently NOT effiicient for line usage. However...They are extremely effective in allowing the internet to get large amounts of data to/from places in a short amount of time by being able to process all your packets in "parallel" mode. So if your message takes 6 packets, those 6 packets can be sent from point A to point B through 6 different routes using a lot of different machines along the way. The message gets to you quicker than sending it all at once, which is line efficient but not network efficient. By the way, you may have heard the term "packet loss." You can now figure out that that means one of the packet's in a message never made it to the receiving machine. When the receiving machine receives a packet for a message, it starts a clock on that message. If it doesn't receive the rest of the packets in a reasonable amount of time, it flags the message as incomplete and logs the packet loss. You now know a bit of how the internet works.
Asked in Computer History
The name for the wireless internet?
wifi ------------------------------ WiFi is actually short for "Wireless Fidelity". And that's not the only name for "Wireless Internet". Wireless Internet can come over cellular signals (Edge, 3G, 4G), WiFi (802.11a/b/g), Amateur Radio (Packet Radio), and a number of other methods. However, all Wireless Internet needs to comply to the same standard (TCP/IP), in some way, before it gets to the computer.
What is difference between circuit switching and packet switching network with table format?
Circuit switching networks create virtual circuits from point A to point B, then switch all packets for that communication along the same route. In packet switching networks, each packet is delivered individually on its own path according the current routing tables, which allows packets to be delivered when a router is down. The packet switch cannot ensure packet order, however.
How do you get across the safari zone bridge in Pokemon ruby?
Asked in Computer Networking
Which of the following NetWare protocols provides guaranteed packet delivery?
How important is TTL to network security what is TTL for and can a Hacker use it to harm you PC or network?
TTL stands for "Time To Live". This is a piece of data in a network packet that specifies how many routers the packet can pass through before the packet expires and is thrown away. Every router that the packet travels through subtracts one from the TTL counter. When it reaches zero, the packet expires. The router will drop the packet, and then send a message back to the computer that sent the packet telling it that the packet has expired. The purpose of the TTL counter is to make routing loops less dangerous. Let me explain.... Routers are devices that look at an incoming data packet and decide where to send it to get it one step closer to its destination. It's possible for one or more routers to be configured such that router A sends the packet to router B, which sends it to router C, which sends it to router A, which then starts it over again. Without the TTL counter, this packet (and any subsequent packet sent to the same destination) would circulate endlessly, taking up bandwidth until someone fixes the routing loop. However, with TTL, each router subtracts one from the TTL counter until eventually the counter hits zero and the packet goes away, giving someone time to fix the problem before the links are so congested with looping packets that it's no longer possible to talk to the router. TTL can affect network security in a couple of ways. Most operating systems set the TTL counter to 64 or 128, which is a pretty large number that will guarantee your packet can get across the Internet. To improve your network security, you can set your TTL counter to a low number. If your internal network is only four routers wide, you can set your TTL to 4. This will ensure that any packets generated on your network will not travel very far beyond your internal network. An attacker can also use the TTL feature to probe your network for the existence and address of your routers. This feature is used by the "traceroute" or "tracert" utility. It works by sending out a packet with a TTL of 1. The first router that the packet encounters will decrement the TTL to 0, drop the packet, then send a message to the traceroute program telling it that the packet expired. By looking at the source address of this packet, traceroute knows the address of the first router. Next traceroute sends a packet with a TTL of 2, which causes the packet to expire at the second router, which sends a message back to traceroute and exposing its address. And so on. Once an attacker knows the addresses of your routers, he or she can start working on compromising them, which can cause you no end of security problems. The solution is to prevent these packets from reaching your routers by using a firewall to block them. HTH, Gdunge
Asked in History of Science, Geology
If rock A cuts across rock B what does this indicate about their hardness?
What is used for travel on water beginning with b?
Asked in Science, Alcoholism
Which microscopic field contains a hypotonic solution?
How does information travel through the internet?
Asked in Jobs & Education, Travel & Places, Definitions
What is the definition of distance in the element of travel?
Asked in Geography, Lakes and Rivers
Match the type of river to its best description. A. Mature rivers b. Young rivers c. Old rivers?
Explain the connection oriented connection less services using bind connect listen accept system calls?
Connectionless Service In a connectionless service, the packets are sent from one party to another with no need for connection establishment or connection release. The packets are not numbered; they may be delayed, lost, or arrive out of sequence. Connection-Oriented Services In a connection-oriented service, a connection is first established between the sender and the receiver. Data are transferred. At the end, the connection is released. Connection Establishment Connection establishment involves the following: Host A sends a packet to announce its wish for connection and includes its initialization information about traffic from A to B. Host B sends a packet to acknowledge (confirm) the request of A. Host B sends a packet that includes its initialization information about traffic from B to A. Host A sends a packet to acknowledge (confirm) the request of B. This connection establishment implies the steps i.e. bind, connect, listen & accept