through transmission medium
B. S. Ryabinin has written: 'Across the Urals' -- subject(s): Description and travel
Connectionless connection ie Computer A does not care if computer B receives the Packet of data or not, Computer A simply sends the packet to computer B.
b. Payload that's what the data in a packet is called. The other parts are "header" and "trailer" depending on if they are at the beginning or end of the packet
C
The short answer is "no." The longer answer is that "packet switching" is the way the internet works. If you send a very short message, it might end up as a single "packet." A packet consists of a sandwich that contains your message as the filling. The beginning contains routing information - where you want the message to go, and eventually where the message has been (how many stops it made along the way and what their address is). The end contains information to keep the message "clean" and be sure we don't drop some words or letters, or add some.If your message is long, it will probably be divided into several packets, and each packet is identified with a unique message identifier showing it is your message in a number of pieces and a sequence within the message. Each packet is then sent out over the internet. Each packet will probably follow a different route through the internet, stopping at different places along the way to the destination. At the destination, the receiving machine will recognize that a packet is part of a bigger message, and store it until all the parts are received. It will then assemble it as a single message and pass it on to your application, usually your internet browser such as Internet Explorer or Firefox.So...a line is more efficient when you fill it with large blocks of data. When you use packets you are duplicating a lot of information in each packet, and generating information to identify the packet and the data within it. Therefore, packets are inherently NOT effiicient for line usage. However...They are extremely effective in allowing the internet to get large amounts of data to/from places in a short amount of time by being able to process all your packets in "parallel" mode. So if your message takes 6 packets, those 6 packets can be sent from point A to point B through 6 different routes using a lot of different machines along the way. The message gets to you quicker than sending it all at once, which is line efficient but not network efficient. By the way, you may have heard the term "packet loss." You can now figure out that that means one of the packet's in a message never made it to the receiving machine. When the receiving machine receives a packet for a message, it starts a clock on that message. If it doesn't receive the rest of the packets in a reasonable amount of time, it flags the message as incomplete and logs the packet loss. You now know a bit of how the internet works.
wifi ------------------------------ WiFi is actually short for "Wireless Fidelity". And that's not the only name for "Wireless Internet". Wireless Internet can come over cellular signals (Edge, 3G, 4G), WiFi (802.11a/b/g), Amateur Radio (Packet Radio), and a number of other methods. However, all Wireless Internet needs to comply to the same standard (TCP/IP), in some way, before it gets to the computer.
somethingsomethingsomethingsomethingsomethingsomethingsomethingsomethingsomethingsomethingsomethingsomethingsomethingsomethingsomethingsomethingsomethingsomethingsomethingsomething
Network Data-link
a. NWLink b. IPX c. SPX d. NCP
TTL stands for "Time To Live". This is a piece of data in a network packet that specifies how many routers the packet can pass through before the packet expires and is thrown away. Every router that the packet travels through subtracts one from the TTL counter. When it reaches zero, the packet expires. The router will drop the packet, and then send a message back to the computer that sent the packet telling it that the packet has expired. The purpose of the TTL counter is to make routing loops less dangerous. Let me explain.... Routers are devices that look at an incoming data packet and decide where to send it to get it one step closer to its destination. It's possible for one or more routers to be configured such that router A sends the packet to router B, which sends it to router C, which sends it to router A, which then starts it over again. Without the TTL counter, this packet (and any subsequent packet sent to the same destination) would circulate endlessly, taking up bandwidth until someone fixes the routing loop. However, with TTL, each router subtracts one from the TTL counter until eventually the counter hits zero and the packet goes away, giving someone time to fix the problem before the links are so congested with looping packets that it's no longer possible to talk to the router. TTL can affect network security in a couple of ways. Most operating systems set the TTL counter to 64 or 128, which is a pretty large number that will guarantee your packet can get across the Internet. To improve your network security, you can set your TTL counter to a low number. If your internal network is only four routers wide, you can set your TTL to 4. This will ensure that any packets generated on your network will not travel very far beyond your internal network. An attacker can also use the TTL feature to probe your network for the existence and address of your routers. This feature is used by the "traceroute" or "tracert" utility. It works by sending out a packet with a TTL of 1. The first router that the packet encounters will decrement the TTL to 0, drop the packet, then send a message to the traceroute program telling it that the packet expired. By looking at the source address of this packet, traceroute knows the address of the first router. Next traceroute sends a packet with a TTL of 2, which causes the packet to expire at the second router, which sends a message back to traceroute and exposing its address. And so on. Once an attacker knows the addresses of your routers, he or she can start working on compromising them, which can cause you no end of security problems. The solution is to prevent these packets from reaching your routers by using a firewall to block them. HTH, Gdunge
B Altomor
You need the acro bike, use the side hop, press b and right or b and up to get across.