Which layer transports data to and from application level, includes the destination port number, and also handles error detection and recovery.
1 2462In what protocol, connection must be established before exchanging data. This is a reliable and requires more processing.
1 2768In What Protocol, message are just delivered. It is not reliable, and requires that transmission quality be augmented. It is fast, however.
1 2538User Datagram Protocol (UDP) is __ and __ a. connectionless, stateless b. connection-orineted, stateless c. connection-oriented, stateful d. connectionless, stateful
1787TCP is _ and _ ? a. connectionless, stateless b. connection-orineted, stateless c. connection-oriented, stateful d. connectionless, stateful
1 2512What resolves the differences in data byte ordering, data type size, representation and alignment between architecture.
1 2528Post New Networking Administration Questions
What is network management?
hi all of you i m looking part time online job (data entry)without investment , please help me
Which application protocol can not be blocked by the Switch?
how i can Design a client–server network with two servers operating at 100Base- T Fast Ethernet speed and the clients operating at regular 10Base-T Ethernet speed using a 10/100 Mbps NIC. The hub is located in a wiring closet, but the servers and clients are not. Assume that a satisfactory performance is achieved at 40% utilization of the LAN.
Can you please explain the difference between straight-through and crossover cable?
What are your key strengths as a System/network Administrator?
I want to Use Motorola Canopy 5.4 GHZ System for wireless Internt , i need how setup this network , i need step by step guide , Also i need what Hard i need for in such setup .
Define dhcp?
What is the Multicast address used in STP ?
main roll of network administrator
What is the importance of authentication?
Explain how to identify the ip class of a given ip address?
What is clustering support?
What are the drawbacks of implementing a ring topology?
Explain how to securing a computer network?