answersLogoWhite

0

Presentation Layer - ASCII or EBCDEC data syntax. Makes the type of data transparent to the layers around it. Used to translate date to computer specific format such as byte ordering. It may include compression. It prepares the data, either for the network or the application depending on the direction it is going.

User Avatar

Wiki User

13y ago

What else can I help you with?

Related Questions

What are Moving packets from source to destination across multiple networks called?

Router


What is inter network?

An internetwork is a collection of individual networks, such as LANs or WANs, connected by routers to enable communication across different networks. It allows devices on different networks to exchange data by forwarding packets between them. The internet is a prime example of a vast internetwork connecting millions of networks worldwide.


Functionality of mobile systems across heterogeneous networks?

Functionality of mobile systems across heterogeneous Networks


What software program relays mail across computer networks such as the Internet?

Any mail server program. You mean which protocol? That would be SMTP, the Simple Mail Transport Protocol.


List the main responsibility of the Internet Protocol?

To transfer data packets across the Internet


What is the difference between a software virus and a software worm?

A software virus attaches itself to a program or file and requires user action to spread, while a software worm can self-replicate and spread without user intervention. Viruses need a host file to infect, while worms can move across networks independently.


What is the difference between a wireless port and a router?

I assume you mean wireless access point? A wireless access point allows you to connect wirelessly to a wired network. A router routes packets across different networks/subnets. Both are completely different devices but can be bundled together.


What are destructive software at least for of them?

Some examples of destructive software include ransomware, which encrypts files and demands payment for decryption; viruses, which replicate and spread to damage a system; trojans, which masquerade as legitimate software to steal information or control a system; and worms, which self-replicate and spread across networks to consume bandwidth and resources.


What two processes move large packets of molecules across the cell membrane?

osmosis and diffusion


What occurs next in the encapsulation process after the web page data is formatted and separated into TCP segments?

The server adds the source and destination IP addresses to the packet header. TCP------>Transmission control protocol is used in Transport layer which is the fourth layer.The Network layer is the third layer's data segments is converted into Packets in the network layer.In network layer packets are created and addressed them to transport across the other networks.


What is the process of breaking down information sent or transmitted across the Internet into small parts called packets?

Packetization is the process of breaking down information sent or transmitted across the Internet into small parts called packets. Packetization is used in many different fields.


What is the command to find out which path or route packets travel across a network?

Use traceroute (tracert) or pathping