1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
qwelly [4]
3 years ago
8

The entirety of a packet at one layer becoming the payload section at another layer is known as

Computers and Technology
2 answers:
marusya05 [52]3 years ago
8 0
The best answer to this question would be encapsulation

Payload data is part of a packet that is within a TCP or a UDP. It is the actual or essential data that is being carried within a packet. For instance, a layer 2 Frame has a payload of a layer 3 packet and a layer packet has a payload of layer 4 Segment. This simply can be called encapsulation. Each layer in the examples mentioned builds a PDU by adding a header containing control information to the PDU.  



-BARSIC- [3]3 years ago
3 0

Answer:

The entirety of a packet at one Layer becoming the payload section at another is know as <u>Encapsulation</u>

<u>Explanation:</u>

Encapsulation can be defined  as a strategy for planning secluded correspondence conventions in which sensibly separate capacities in the system are disconnected from their basic structures by incorporation or data covering up inside more elevated amount objects.

You might be interested in
What shortcut keys do i use to print something on my keyboard ?
romanna [79]
CTRL+P. It's usually pressed when you want to print something.
5 0
3 years ago
Read 2 more answers
write a function that given an integer Y and 3 non-empty string A,B,W, denotingthe year of vacations, the beginning month, the e
chubhunter [2.5K]

Answer:un spain please

Explanation:

4 0
3 years ago
Which of the following protocols support the encryption and decryption of e-mail messages?
Katena32 [7]
It seems that you have missed the necessary options for us to answer this question so I had to look for it. Anyway, here is the answer. The protocol that supports the encryption and decryption of e-mail messages is this: <span>Secure Multipurpose Internet Mail Extensions (S/MIME) and Pretty Good Privacy (PGP). Hope this helps.</span>
7 0
3 years ago
The difference between Return key and word Wrap
saveliy_v [14]
The enter key is used when we want to go directly to the next line while writing whereas through word wrap the cursor automatically shifts to the next line when the word limit for a particular line is exceeded
3 0
3 years ago
Join my giggl PLEASE i am so bored link will be in comments
asambeis [7]

Answer:

in which app we had to join

5 0
3 years ago
Read 2 more answers
Other questions:
  • Switches operate on what layer of the OSI Model
    11·1 answer
  • What does SIP stand for?
    5·2 answers
  • What nondestructive testing method requires little or no part preparation, is used to detect surface or near-surface defects in
    7·1 answer
  • An example of how a merge field will appear in a document is ______.
    7·2 answers
  • [20 pts] Assume that Bob wants to send a secret message to Alice using RSA encryption. (a) [5pts] (Key generation step) Assume A
    8·1 answer
  • Digital printing is not suitable for printing what
    11·1 answer
  • LAB: Plant information (ArrayList) Given a base Plant class and a derived Flower class, complete main() to create an ArrayList c
    6·1 answer
  • 8.7 Code Practice: Question 2 edhesive
    14·2 answers
  • Can someone help me with this lab assignment? I really do not know what should I do?
    5·1 answer
  • Can someone help me with python
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!