Voip
No - Transport layer protocols are not concerned with addressing packets to the correct system. (True)
ICMP
Segments
True
A computer can communicate with other computers over telephone lines and the internet through modems and networking protocols. A modem converts digital data from the computer into analog signals for transmission over telephone lines and vice versa. For internet communication, the computer uses networking protocols like TCP/IP to send and receive data packets over various types of connections, including broadband, fiber, or wireless. This allows seamless interaction across different mediums.
Yes, there is activity; packets do not have to be generated for the sole purpose of carrying data. Some protocols, such as DHCP, or DNS, or ARP generate informational packets and are not carrying data. It is rare for a network to not transmit packets for long periods of time.
The role is to transfer frames to packets
A "protocol" is a set of rules used in networking, for a particular purpose. IP (the Internet Protocol) is the protocol used to transmit packets over various networks.TCP (the Transmission Control Protocol) is the protocol which (among other things) ensures a high degree of reliability over inherently unreliable networks. That is, individual IP packets may be lost, but TCP ensures that they are retransmitted. TCP/IP is a protocol suite - in other words, a group of related protocols. It is named after two important protocols, explained, above, but it actually includes various other protocols as well.
Packet delivery is primarily guaranteed by protocols that implement error detection, acknowledgment, and retransmission mechanisms. In the TCP (Transmission Control Protocol), for instance, packets are tracked and acknowledged, ensuring that lost packets are retransmitted. Additionally, techniques like checksums and sequence numbers help verify that packets arrive intact and in the correct order. In contrast, protocols like UDP (User Datagram Protocol) do not guarantee delivery, making it suitable for applications where speed is prioritized over reliability.
Stateful packet filters can struggle with packets that utilize fragmentation, as they may not reassemble fragmented packets correctly, leading to potential security vulnerabilities. Additionally, packets that exploit application-layer protocols, such as malformed HTTP requests or DNS spoofing attempts, can bypass stateful inspection if the filter does not adequately analyze the payload. Moreover, encrypted packets can pose challenges, as the filter may not be able to inspect their contents or verify their legitimacy without decrypting them.
A) people B) transmission and hardware C) protocols and software D) Internet access
routing protocol: helps to find the best path to transfer the packets from one network to diffrent network example: rip: routing information protocol igrp, ospf...... routed protocol: helps to carry the packets to the destination. example: smtp : transfer the mails ftp : transfer the files.