answersLogoWhite

0

If data is to be transmitted correctly and any fallout or errors corrected, the protocols cannot be ambiguous at all.

User Avatar

Wiki User

15y ago

What else can I help you with?

Related Questions

What about coexistance of IPv4 and IPv6 on the same network and What OS supports this?

Quite simply, both protocols must be enabled - both on the computer and on the routers.Quite simply, both protocols must be enabled - both on the computer and on the routers.Quite simply, both protocols must be enabled - both on the computer and on the routers.Quite simply, both protocols must be enabled - both on the computer and on the routers.


Which protocol is not routable?

NON-ROUTABLE PROTOCOLS cannot survive being routed. Non-routable protocols presume that allcomputers they will ever communicate with are on the same network (to get them working in a routed environment, you must bridge the networks). Todays modern networks are not very tolerant of protocols that do not understand the concept of a multi-segment network and most of these protocols are dying or falling out of use.NetBEUIDLCLATDRPMOP


What is the function of the network access layer?

The Network Access Layer is the lowest layer of the TCP/IP protocol hierarchy. The protocols in this layer provide the means for the system to deliver data to the other devices on a directly attached network. It defines how to use the network to transmit an IP datagram. Unlike higher-level protocols, Network Access Layer protocols must know the details of the underlying network (its packet structure, addressing, etc.) to correctly format the data being transmitted to comply with the network constraints. The TCP/IP Network Access Layer can encompass the functions of all three lower layers of the OSI reference Model (Network, Data Link, and Physical).


Elementary data link protocols?

Elementary data link protocols must agree at the most rudimentary level. The data frame must be constructed from this level, and all protocols must agree.


What is the function of the access layer?

The Network Access Layer is the lowest layer of the TCP/IP protocol hierarchy. The protocols in this layer provide the means for the system to deliver data to the other devices on a directly attached network. It defines how to use the network to transmit an IP datagram. Unlike higher-level protocols, Network Access Layer protocols must know the details of the underlying network (its packet structure, addressing, etc.) to correctly format the data being transmitted to comply with the network constraints. The TCP/IP Network Access Layer can encompass the functions of all three lower layers of the OSI reference Model (Network, Data Link, and Physical).


What is the major function of the network access layers?

The Network Access Layer is the lowest layer of the TCP/IP protocol hierarchy. The protocols in this layer provide the means for the system to deliver data to the other devices on a directly attached network. It defines how to use the network to transmit an IP datagram. Unlike higher-level protocols, Network Access Layer protocols must know the details of the underlying network (its packet structure, addressing, etc.) to correctly format the data being transmitted to comply with the network constraints. The TCP/IP Network Access Layer can encompass the functions of all three lower layers of the OSI reference Model (Network, Data Link, and Physical).


The role of port numbers in Multiplexing?

Once data is routed through the network and delivered to a specific host, it must be delivered to the correct user or process. As the data moves up or down the layers of TCP/IP, a mechanism is needed to deliver data to the correct protocols in each layer. The system must be able to combine data from many applications into a few transport protocols, and from the transport protocols into the Internet Protocol. Combining many sources of data into a single data stream is called multiplexing. Data arriving from the network must be demultiplexed, divided for delivery to multiple processes. To accomplish this, IP uses protocol numbers to identify transport protocols, and the transport protocols use port numbers to identify applications.


Does two computers in the same network must have same OS?

No. Different operating systems provide different features, but as long as the OS has compatible protocols, communication is possible.


Which of the following are requirements for summarization to work correctly?

Multiple IP addresses..., Routing protocols must base...., Routing protocols must carry...


What Rules that network devices use to communicate?

A network must use a common language or set of rules to be able to communicate with other networks. These rules are standardized by committee and are an agreed upon set of rules. These rules are known as protocols, and are widely published.


Is network security increasing overhead?

Absolutely. The overhead comes in different ways as well. You have the overhead in the network bandwidth and processing because the security protocols must examine the information, and you have the overhead involved with policies, procedures, and the use of people to manage the whole thing.


Why is the internet regarded as the biggest internet website?

It is NOT!The internet is a network not a website.The internet is a network connecting many different nodes: some are websites but many are not websites. Many nodes on the internet are specialized servers that provide information as individual computers request it and no more (e.g. time standards), other nodes are computers that do not support the protocols used by websites and must be accessed only with lower level internet protocols, etc.