answersLogoWhite

0

No, the NIC will automatically install its own protocols and use them if needed

User Avatar

Wiki User

16y ago

What else can I help you with?

Continue Learning about Computer Science

When was TCP invented?

Two of the most common "Communication Protocols" are typically ( not always ) referred to together. Transmission Control Protocol, and Internet Protocol. Although they are both communication protocols, they are not the same thing. They are referred to together only when necessary, such as configuring a PC's network, as you are configuring both. Both have been around since mid 70's when they were invented, but TCP was never "added." They are just referred to together when appropriate.


How difficult is CompTiA Network plus Certification (N10-006)?

The CompTIA Network+ Certification (N10-006) is considered moderately difficult, especially for those new to networking concepts. It covers a broad range of topics, including network architecture, operations, security, and troubleshooting. Candidates with some hands-on experience and foundational knowledge in IT may find it manageable, while those without prior exposure may need to invest significant study time. Overall, with adequate preparation and study resources, most candidates can successfully pass the exam.


What is the purpose of TCP or UDP port numbers?

The purpose of TCP is a connection oriented protocol, meaning that protocol establishes a connection or session between the sources and destination device prior to sending the data segment. UDP is transport layer protocol that provides an interface between the application layer and the network layer.


What is the definition of system file checker?

A router is an Intermediate System (IS) which operates at the network layer of the OSI reference model. Routers may be used to connect two or more IP networks, or an IP network to an internet connection. A router consists of a computer with at least two network interface cards supporting the IP protocol. The router receives packets from each interface via a network interface and forwards the received packets to an appropriate output network interface. Received packets have all link layer protocol headers removed, and transmitted packets have a new link protocol header added prior to transmission. The router uses the information held in the network layer header (i.e. IP header) to decide whether to forward each received packet, and which network interface to use to send the packet. Most packets are forwareded based on the packet's IP destination address, along with routing information held within the router in a routing table. Before a packet is forwarded, the processor checks the Maximum Transfer Unit (MTU) of the specified interface. Packets larger than the interface's MTU must be fragmented by the router into two or more smaller packets. If a packet is received which has the Don't Fragment (DF) bit set in the packet header, the packet is not fragmented, but instead discarded. In this case, an ICMP error message is returned to the sender (i.e. to the original packet's IP source address) informing it of the interface's MTU size. This forms the basis for Path MTU discovery (PMTU). The routing and filter tables resemble similar tables in link layer bridges and switches. Except, that instead of specifying link hardware addresses (MAC addresses), the router table sepcify network (IP addresses). The routing table lists known IP destination addresses with the appropraite network interface to be used to reach that destiantion. A default entry may be specified to be used for all addresses not explicitly defined in the table. A filter table may also be used to ensure that unwanted packets are discarded. The filter may be used to deny access to particular protocols or to prevent unauthorised access from remote computers by discarding packets to specified destination addresses. A router forwards packets from one IP network to another IP network. Like other systems, it determines the IP network from the logical AND of an IP address with the associated subnetwork address mask. One execption to this rule is when a router receives an IP packet to a network broadcast address. In this case, the router discards the packet. Forwarding broadcast packet can lead to severe storms of packets, and if uncontrolled could lead to network overload. A router introduces delay (latency) as it processes the packets it receives. The total delay observed is the sum of many components including: * Time taken to process the frame by the data link protocol * Time taken to select the correct output link (i.e. filtering and routing) * Queuing delay at the output link (when the link is busy) * Other activities which consume processor resources (computing routing tables, network management, generation of logging information) The router queue of packets waiting to be sent also introduces a potential cause of packet loss. Since the router has a finite amount of buffer memory to hold the queue, a router which receives packets at too high a rate may experience a full queue. In this case, the router ahs no other option than to simply discard excess packets. If required, these may later be retransmitted by a transport protocol. Architecture of a router Routers are often used to connect together networks which use different types of links (for instance an HDLC link connecting a WAN to a local Ethernet LAN). The optimum (and maximum) packet lengths (i.e. the maximum transmission unit (MTU)) is different for different types of network. A router may therefore uses IP to provide segmentation of packets into a suitable size for transmission on a network. Associated protocols perform network error reporting (ICMP), communication between routers (to determine appropriate routes to each destination) and remote monitoring of the router operation (network management). The operation of a simple modern router is described on a separate page. If you want to know how the router actually works click HERE.


Why is it necessary to seek the agreement of the client prior to providing services?

it is necessary to have the agreement of the client prior to providing services because the client has the right to make their own choices and decisions when it comes to disclosing their personal information

Related Questions

What is the advantage of creating your sites and subnets prior to installing subnsequent domain controllers?

ANSWER: When your domain controllers are installed and an IP address is assigned, they will automatically be placed in the site associated with their network address. This will save you the step of moving them later.


Help on hamachi when i try to start it say Meditation server has denied your request?

This would typically occur when upgrading from Hamachi to Hamachi2. Please uninstall Hamachi2, removing all user preferences, and then reinstall to acquire a new IP Address and Client ID. If you removed Hamachi prior to installing the current client, then the settings still remained.


What does installing Microsoft frontpage prior to installing internet information services on a windows xp professional computer allow you to do?

insert tables, scripts, adn graphics in web pages


Oceanic system of trade prior to 1500?

A network of exchange and communication characterized the oceanic system of trade prior to 1500


Why Internet and its protocols is prior over OSI?

The OSI model came after TCP/IP networking protocols were available in networks. The OSI description also as to describe and identify networking components that do not exist in the TCP/IP model.


How do you prime a new oil pump?

I've always packed the new pump with petrolem jelly prior to installing it


Moen faucet still drips after changing cartridge?

Did you flush out the valve body prior to installing the new cartridge


Does dish network do a background check?

Yes, DISH Network does indeed perform a background check prior to hiring any potential employee.


What procedure is used to allow final positioning of LWFB and to verify its alignment prior to installing the anchoring system?

pre-tensioning


What is the function of gateway and where is it used?

A "gateway" is a device on a computer network which acts as the networks' external (front-facing) interface prior to connection to another network (which may or may not use different protocols), most commonly the Internet. A gateway could be a router, modem or (especially so in the past), another computer which is built specifically to handle the duties of the aforementioned devices. They are used as a "gateway" to another network and see very common usage. You probably have at least one in your house - to view this very webpage!


What information is required prior to dividing a netowrk into subnets?

network class network address number of subnets required number of host per subnet


State the purpose of testing hardware prior to installing an Operating System?

becase if you start installing an o.s you may counter problems if the hardware is faulty as well as it may fail in the future when your just about to save your work or it could happen anytime.