answersLogoWhite

0

The server knows by the destination port number, which attaches a listening program to a specific protocol.

User Avatar

Wiki User

15y ago

What else can I help you with?

Related Questions

What describes multiple computers connected and communicating?

network


What network map is one of the most powerful and versatile methods of communicating over a network?

Drive


What address do the external entities use when communicating with your network?

IP


What is the process of one computer communicating to just one other computer on a network?

Unicast


Is a network device devoted to storage and delivery of frequently requested files?

cache engine


What is a network device devoted to storage and delivery of frequently requested files?

Cache engine.


What does duration mean in network connection?

The elapsed times that client and server was communicating to each other.


Can a network backup be made remotely?

There are many different ways one can backup a network remotely. One can determine the steps one might need to take at "Social Tech" or "CompNetworking."


What is SSL protocol?

The Secure Socket Layer (SSL) is a security protocol deployed on networks. The network can be an internal network or the internet over which two computers are communicating.


In computer terms what is social networking?

In social networking Social mean society and networking means no. of autonomous system in a network communicating to each other. Combining these we conclude that communicating socially over a network is what we call social networking. Ex: facebook, twitter, google+ etc


What is meant by the term Social Networking?

In social networking Social mean society and networking means no. of autonomous system in a network communicating to each other. Combining these we conclude that communicating socially over a network is what we call social networking. Ex: facebook, twitter, google+ etc


What are three important reasons to establish a network baseline?

to determine which areas in the network are underutilized or overutilizedto determine the performance of the network during the normal hours of operationto determine what thresholds should be set for the devices that need to be monitored