1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
REY [17]
4 years ago
7

Suppose end system A wants to send a large file to end system B. At a very high level, describe how end system A creates packets

from the file. When one of these packets arrives to a packet switch, what information in the packet does the switch use to determine the link onto which the packet is forwarded? Why is packet switching in the Internet analogous to driving from one city to another and asking directions along the way?
Computers and Technology
1 answer:
kvasek [131]4 years ago
6 0

Answer:

When we journey from a particular city to another city and we don’t really know the path then we ask for path and go on that which is just the same thing as packet switching.

Explanation:

Suppose system A intends to send packet to system B the steps and procedures are given below

1. A breakdown of large file into smaller bits of data on system A will first occur.

2.It attach separate headers for every portion of the file so that each portion looks like separate packet.

3.Header file in chunks will contain ip address of the file receiver which here is system B.

4. the Switch system will utilize the IP present in header to decide the link to destination.

You might be interested in
Which of the following statements is NOT true regarding the Security Configuration and Analysis (SCA) tool?
borishaifa [10]

Answer: a. It evaluates the current security state of computers in accordance with Microsoft security recommendations

Explanation:

The Security Configuration and Analysis tool allows the configuration of local computers through the application of the settings in a security template to the local policy.

This allows an administrator to analyze a computer and compare its configuration settings with a baseline. The Security Configuration and Analysis (SCA) tool also uses security templates to store the settings that make up baselines.

Therefore, based on the options given, the correct option is A as the SCA tool doesn't evaluate the current security state of computers in accordance with Microsoft security recommendations.

8 0
3 years ago
What is working with others to find a mutually agreeable outcome?
aleksley [76]
Verbal communication im pretty sure
6 0
3 years ago
Read 2 more answers
Janice’s grandmother stayed at home and took care of her family while her grandfather worked. Today Janice lives on her own and
egoroff_w [7]
The answer is
b. Social change
6 0
3 years ago
Read 2 more answers
Point giveaway and brainliest
melamori03 [73]

Thank you, pal!

You are invited to my clubhouse!

5 0
3 years ago
Read 2 more answers
To download your presentation as pictures, choose this option.
VARVARA [1.3K]

Answer:

Download as Images

Explanation:

Copy is unspecified

Images is a synonym of pictures

PDF is a file type

ODP is a presentation file

8 0
3 years ago
Read 2 more answers
Other questions:
  • Activities that scan network locales for active systems and then identify the network services offered by the host systems is kn
    12·1 answer
  • Can Any body Define what is search engine in a simple language quick please​
    14·1 answer
  • Your friend wants to know about Microsoft Expression Web 4. Which of the following terms will you use to describe Microsoft Expr
    5·1 answer
  • 3. You arrive at an intersection with traffic lights that are not working because of a power outage. What do you do?
    9·1 answer
  • What's a checked exception?
    14·2 answers
  • Serting a header at the top of a page will make it appear on_____. ?
    13·1 answer
  • Help me guys plssssss​
    10·1 answer
  • Assume the user responds with a 3 for the first number and a 5 for the second number.
    13·1 answer
  • Which three statements are true of lossless compression?
    6·1 answer
  • Why is my computer fans making weird noises?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!