answersLogoWhite

0

What else can I help you with?

Related Questions

In a token ring network what happens to a packet when it reaches the computer it was sent to?

The token is set to 'received' and both the token and the packet are regenerated and placed on the network for the next station. The only system that may remove the packet is the station that originally sent it.


What does a bridge do when it receives a packet that is destined for a system on the same network segment from which the packet arrived?

jamaican


What is the difference between direct and indirect routing?

When a system sends an IP packet to another system in a network, it is direct routing. When a system sends an IP packet to another system via a third system or more systems in a network, it is indirect outing.


The telephone system uses packet-switching technology where as the Internet uses circuit-switching technology?

telephone system uses packet switching because packet switching is reiable. In a packet switching when a packet(some part of total information) is lost then the packet can be retransmitted. But in case of circuit switching if any part of data is lost anytime then total data will be retransmitted. Again circuit swithing is more speedy with compare to packet switching.In order to increase the bit rate (more speed) circuit switch is prefered in Internet.


What is the default location for packet tracer?

The default installation location for Cisco Packet Tracer varies depending on the operating system. On Windows, it is typically installed in C:\Program Files\Cisco Packet Tracer <version> or C:\Program Files (x86)\Cisco Packet Tracer <version>. For macOS, it is usually found in the /Applications/Cisco Packet Tracer <version> directory. Users can always check their system settings or installation preferences for the exact location.


In a connectionless system which of the following is correct?

The destination is not contacted before a packet is sent.


What command you use to deinstall a rpm packet foobar from your system?

yum remove foobar


How the operating system knows the difference between tcp and udp packet?

The "packets" are actually called "segments" in the case of layer 4 (i.e., TCP or UDP).When creating an IP packet, a host (computer, or other equipment that participates in a communication) adds information to the "protocol" field. This indicates whether the IP packet transports a TCP segment, a UDP segment, or some other kind of information.The "packets" are actually called "segments" in the case of layer 4 (i.e., TCP or UDP).When creating an IP packet, a host (computer, or other equipment that participates in a communication) adds information to the "protocol" field. This indicates whether the IP packet transports a TCP segment, a UDP segment, or some other kind of information.The "packets" are actually called "segments" in the case of layer 4 (i.e., TCP or UDP).When creating an IP packet, a host (computer, or other equipment that participates in a communication) adds information to the "protocol" field. This indicates whether the IP packet transports a TCP segment, a UDP segment, or some other kind of information.The "packets" are actually called "segments" in the case of layer 4 (i.e., TCP or UDP).When creating an IP packet, a host (computer, or other equipment that participates in a communication) adds information to the "protocol" field. This indicates whether the IP packet transports a TCP segment, a UDP segment, or some other kind of information.


What would one use a packet sniffer for?

Although unfamiliar with the term packet sniffer is has been discovered that it is a term related to technology. A packet sniffer is used by a system administrator or network to troubleshoot and monitor a network. It helps to maintain network data transmission.


What do the letters tcpip stand for?

TCP/IP is a very common type of network protocol.TCP stands for Transmission Control Protocol and is used to create data connections between computers. Primarily, it is a "connection oriented protocol" in a sense that every connection goes through a three-way-handshake (SYN, ACK/SYN, ACK) to establish a connection before data is transmitted. Once the connection is established, each data packet that is received by the destination computer triggers an ACK packet (short for Acknowledge) to say that the data was received without error. That ACK packet will not be sent if the data packet is not received or if the data packet does not match the CRC (Cycle Redundancy Check). If the computer that sent the data packet does not hear that ACK packet, it sends the data packet again. The majority of traffic on the internet is TCP.TCP can be easily compared to UDP (User Datagram Protocol) which does not create a "connection" or ask for a acknowledgment packet and therefor typically has less overhead and latency. With UDP, data is sent to an address without worry for whether or not it reached its destination successfully. It is often used for streams such as internet radio/audio or video.IP stands for Internet Protocol. IP is the framework that lets computers address and communicate with each other. Most commonly known is an IP Address. An IP Address is a set of numbers given to a computer so that it may communicate with other computers with IP addresses. A common analogy is the phone system. To talk to someone, you simply dial their number.For example, to submit this answer, my computer made a TCP connection to wiki.answers.com's IP address and sent a data stream containing my writings. After each packet my computer sent, wiki.answers.com sent an acknowledge packet back.


What is the TTL - Time to Live and Why is it required?

TTL is a value in data packet of Internet Protocol. It communicates to the network router whether or not the packet should be in the network for too long or discarded. Usually, data packets might not be transmitted to their intended destination within a stipulated period of time. The TTL value is set by a system default value which is an 8-bit binary digit field in the header of the packet. The purpose of TTL is, it would specify certain time limit in seconds, for transmitting the packet header. When the time is exhausted, the packet would be discarded. Each router receives the subtracts count, when the packet is discarded, and when it becomes zero, the router detects the discarded packets and sends a message, Internet Control Message Protocol message back to the originating host.


What is abbreviation of GPRS?

There are a couple of them- General Packet Radio Service, Global Packet Radio System... These are the top 2... And you have spelt Abbreviation wrong, but its all good :-)