1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
charle [14.2K]
3 years ago
7

What is three-way handshake? Draw a diagram showing how a TCP connection is established through three-way handshake.

Computers and Technology
2 answers:
Levart [38]3 years ago
8 0

Explanation:

A three way handshake is a method to create a connection between host and server.It is used in a TCP/IP network.

To establish a connection three steps are followed which are as following:-

  1. The host or sender sends a data packet called SYN to the server or receiver.It's purpose is to as if the receiver is open for new connections.
  2. When the receiver receives the SYN packet it responds with an ACK or SYN/ACK packet as a confirmation for the connection.
  3. When the sender receives the SYN/ACK packet and it respond with ACK packet.

olga nikolaevna [1]3 years ago
6 0

Answer:

three-way handshake is a process that is used in a TCP/IP network to make a connection between the server and client.

Explanation: This 3-way TCP, is a three-step process that requires both the client and server to exchange synchronization and acknowledgment packets before the real data communication process starts.

The three-way handshake process is designed in such a way that both ends help you to initiate, negotiate, and separate TCP socket connections at the same time. It allows you to transfer multiple TCP socket connections in both directions at the same time.

You might be interested in
Bonjour ma question est: expliquer comment fonctionne une calculatrice qui ne contient pas une pile. Pouvez-vous m'aider?
larisa [96]

Answer:

Tout calculateur électronique ou numérique nécessite une source d'alimentation pour fonctionner, avec son circuit configuré à la porte logique requise liée aux touches d'entrée et à l'écran de sortie.

Explanation:

Les calculatrices sont des appareils utilisés pour les calculs arithmétiques. Au 19ème siècle, les calculatrices étaient mécaniques et n'utilisaient pas de batterie, elles étaient encombrantes et utilisaient des tiges et des engrenages dans leur fonctionnement. Les calculatrices récentes sont électroniques, alimentées par une batterie. Ils comprennent un circuit électronique configuré à sa porte logique requise pour le calcul, un bouton pour l'entrée et un écran pour la sortie du calcul.

6 0
3 years ago
Write a short note on Computer<br>impact on<br> our society?​
Vesna [10]

well not a note but here are some few points

Explanation:

1 Computers can have the huge impact on employment of people like job and other stuff.

2 lots of human can be jobless or unemployed

3 it can cuz impact on the health of peoples

4 it also can make us lazy and and lack of self knowledge

8 0
3 years ago
Read 2 more answers
Define a function called 'findWordFreq, which takes two parameters. The first parameter, 'text" is an nltk.text.Text object and
MakcuM [25]

Answer:

import os

import nltk

import zipfile

from nltk. corpus import gutenberg

from nltk. text import Text

def findWordFreq(text, word):

   textfreq = nltk. FreqDist(text)

   wordfreq = nltk.FreqDist(word)

   maxfreq = max(textfreq)

   return wordfreq, maxfreq

if -_name__ == '__main__':

   text = input()

   word = input()

   if not os.path.exists(os.getcwd() + "/nltk_data"):

       with zipfile.ZipFile("nltk_data.zip", 'r') as zip_ref:

           zip_ref.extractall(os.getcwd())

   os.environ['NLTK_DATA'] = os.getcwd() + "/nltk_data"

   text = Text(gutenberg.words (text))

   word_freq, max_freq = findWordFreq(text, word)

   print(word_freq)

   print(max_freq)

Explanation:

The natural language package in python is used to get and analyse word from voice input. The python code above get words from a zipfile extract, and the 'findWordFreq' function gets the word count and the maximum number of alphabet used in the word distribution.

4 0
3 years ago
Which type of operation writes the file system structure to the disk?
n200080 [17]
Formatting<span> writes the file system structure to the disk.</span>
8 0
3 years ago
Two systems are connected by a router. Both systems and the router have transmission rates of 1,000bps. Each link has a propagat
Lisa [10]

Answer:

Two systems are connected by a router. Both systems and the router have transmission rates of 1,000bps. Each link has a propagation delay of 10ms. Also, it takes router 2ms in order to process the packet (e.g. decide where to forward it). Suppose the first system wants to send a 10,000 bit packet to the second system. How long will it take before receiver system receives the entire packet.

Transmission time for first Router = 10,000 bits / 1000 bps = 10 seconds

Receiving time for seond route r= 10,000 bits / 1000 bps = 10 seconds

Propagation delay = 10ms = .01 seconds x 2 for two delays = .02 seconds

First router 2ms to process = .002 seconds

Add all the times together and we get 20.022 seconds which is the same as or 20 seconds and 22 ms

4 0
3 years ago
Other questions:
  • A company decides to reduce its IT labor force by hiring an external company to manage various aspects of IT administration, suc
    6·1 answer
  • Which of the following STEM discoverers is known for creating complex computational physics to develop computer models to simula
    7·1 answer
  • This program has some errors in it that are needed to be checked import java.io.*;
    13·1 answer
  • What do developers do to support software products? explain to users which development process model was used to make the produc
    8·1 answer
  • Complete the function void update (int *a, int *b), which reads two integers as argument, and sets a with the sum of them, and b
    8·1 answer
  • Some numbers are formed with closed paths. the digits 0, 4, 6 and 9 each have 1 closed path and 8 has 2. None of the other numbe
    6·1 answer
  • In your own words, describe how a network administrator can use the OSI model to isolate a network problem.
    13·1 answer
  • It is necessary tto save updates often when working in google docs? True or false
    11·2 answers
  • Microsoft Word, Google Chrome, and Windows Media Player are examples of
    15·1 answer
  • De acuerdo con las generaciones de la computación, ¿Creen que estamos en la 5ta generación o aun no? y ¿por qué?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!