answersLogoWhite

0

What else can I help you with?

Related Questions

Is it true or false that transport layer protocols are not concerned with addressing packets to the correct system?

No - Transport layer protocols are not concerned with addressing packets to the correct system. (True)


What protocols assists in determining whether packets reached their destinations?

ICMP


Transport layer protocols break large data units into?

Segments


True or false transport layer protocols are not concerned with addressing packets to the correct system?

True


Is there activity over a network if data is not being transferred?

Yes, there is activity; packets do not have to be generated for the sole purpose of carrying data. Some protocols, such as DHCP, or DNS, or ARP generate informational packets and are not carrying data. It is rare for a network to not transmit packets for long periods of time.


What is the role of the data link layer protocols in data transmission?

The role is to transfer frames to packets


What is a Transmission Control Protocol with Internet Protocol?

A "protocol" is a set of rules used in networking, for a particular purpose. IP (the Internet Protocol) is the protocol used to transmit packets over various networks.TCP (the Transmission Control Protocol) is the protocol which (among other things) ensures a high degree of reliability over inherently unreliable networks. That is, individual IP packets may be lost, but TCP ensures that they are retransmitted. TCP/IP is a protocol suite - in other words, a group of related protocols. It is named after two important protocols, explained, above, but it actually includes various other protocols as well.


What kinds of packets can cause problems for even a stateful packet filter?

Stateful packet filters can struggle with packets that utilize fragmentation, as they may not reassemble fragmented packets correctly, leading to potential security vulnerabilities. Additionally, packets that exploit application-layer protocols, such as malformed HTTP requests or DNS spoofing attempts, can bypass stateful inspection if the filter does not adequately analyze the payload. Moreover, encrypted packets can pose challenges, as the filter may not be able to inspect their contents or verify their legitimacy without decrypting them.


Router that is not configured to drop packets that match certain suspicious characteristics is an example of a risk associated with?

A) people B) transmission and hardware C) protocols and software D) Internet access


What are the types of protocols?

routing protocol: helps to find the best path to transfer the packets from one network to diffrent network example: rip: routing information protocol igrp, ospf...... routed protocol: helps to carry the packets to the destination. example: smtp : transfer the mails ftp : transfer the files.


What represent and transfer information between computers and network systems?

Data packets represent and transfer information between computers and network systems. These packets contain payloads of data, along with headers that include source and destination addresses, allowing them to navigate through networks efficiently. Protocols like TCP/IP govern how these packets are formatted, transmitted, and received, ensuring reliable communication across various devices and networks.


Data is transmitted on a network in pieces called?

Packets Words