answersLogoWhite

0

What else can I help you with?

Related Questions

What field in an ip datagram can be used to indicate that a packet should be routed before any other packets?

The Differentiated Services Field.


What field in an IPv4 packet can be used to indicate that a packet should be routed before any other packets?

SCIENCE


What field in an ipv4 can be used to indicate that a packet should be routed before any other packets?

SCIENCE


Which portion if the destination IP address is used as a packet is routed through the Internet?

Which portion of the destination IP address is used as a packet is routed through the Internet?


What is the Difference between datagram subnet and virtual circuit subnet?

Comparison of Datagram and Virtual Circuit SubnetIssue Datagram Virtual CircuitConnection SetupNoneRequiredAddressingPacket contains full source and destination addressPacket contains short virtual circuit number identifier.State informationNone other than router table containing destination networkEach virtual circuit number entered to table on setup, used for routing.RoutingPackets routed independentlyRoute established at setup, all packets follow same route.Effect of router failureOnly on packets lost during crashAll virtual circuits passing through failed router terminated.Congestion controlDifficult since all packets routed independently router resource requirements can vary.Simple by pre-allocating enough


What happens when sent packet is lost?

packet will be routed in network until its TTL reaches to 0,then it will be discard jawad ciit wah campus


Why transport bridge are supirior than source routed bridges?

trasnposrt bridges is self updating source bridges are used for preventing looping ... here source address defines where packet where will be routed to


Where does the wizard obtain the loop-back address?

Your loop-back address or localhost is always 127.0.0.1. When a packet is sent to this address, the packet is routed internally to the network loopback device. The packet is then received back by your computer as if it came from an outside source.


What is datagram packet?

Clients and servers that communicate via a perfect channel have a dedicated point-to-point channel between themselves (or at least the illusion of one). To communicate, they must first establish the connection, transmit the data, and then close down the connection. All data sent over the channel is received in the same order that it was sent. This is guaranteed by the channel. In contrast, clients and servers that communicate via datagrams send and receive completely independent packets. These clients and servers do not have a dedicated point-to-point channel. Rather the packets are sent on their way over the network on whatever route is available.A packet sent over a perfect channel does not contain any information about its source or its destination. The channel contains that information. In contrast, a datagram packet must contain the complete address of its source or destination (depending on if the datagram is sent or received).Definition: A datagram is an independent, self-contained message sent over the network whose arrival, arrival time, and content are not guaranteed.The java.net package contains two classes to help you write Java programs that use the datagram model to send and receive packets over the network: DatagramSocket and DatagramPacket. A DatagramSocket is a communcation link used to send datagrams between applications. A DatagramPacket is a message sent between applications via a DatagramSocket.


Why is header checksum required in TCP?

Its used to detect an error if the packet may be mis-routed. I'm not 100% sure.


What does it mean when wires are multicolor?

As a rule, wires are multicolored to indicate whether positively or negatively charged, and/or to indicate how they are routed, especially in situations where many wires are housed in one harness...


What is deep packet filtering?

Deep packet filtering first examines the data part (and possibly also the header) of a packet as it passes an inspection point, searching for protocol non-compliance, viruses, spam, intrusions or predefined criteria to decide if the packet can pass or if it needs to be routed to a different destination, or for the purpose of collecting statistical information. This differs from "stateful packet inspection" (shallow filtering) where only the type of traffic and possibly the source and destination are inspected, not the contents of the traffic.