1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
REY [17]
4 years ago
7

Suppose end system A wants to send a large file to end system B. At a very high level, describe how end system A creates packets

from the file. When one of these packets arrives to a packet switch, what information in the packet does the switch use to determine the link onto which the packet is forwarded? Why is packet switching in the Internet analogous to driving from one city to another and asking directions along the way?
Computers and Technology
1 answer:
kvasek [131]4 years ago
6 0

Answer:

When we journey from a particular city to another city and we don’t really know the path then we ask for path and go on that which is just the same thing as packet switching.

Explanation:

Suppose system A intends to send packet to system B the steps and procedures are given below

1. A breakdown of large file into smaller bits of data on system A will first occur.

2.It attach separate headers for every portion of the file so that each portion looks like separate packet.

3.Header file in chunks will contain ip address of the file receiver which here is system B.

4. the Switch system will utilize the IP present in header to decide the link to destination.

You might be interested in
What are some ways in which reading and writing have changed in our newly networked world
olga_2 [115]
Reading and writing have given us both a way to pass on knowledge and learn things we cant learn first hand.<span />
3 0
4 years ago
Double[][] vals =
Vilka [71]

Answer:

4

Explanation:

by counting the number of the colum to. be counted well and nicely

8 0
3 years ago
Meg[] elements = {new Lois(), new Stewie(), new Meg(), new Brian()}; for (int i =0; i
Stells [14]

Complete question is attached as snapshot.

Answer:

This will result in a compilation error.

Here's the inheritance hierarchy:

Meg -> Lois -> Brian -> Stewie

Now Meg has 2 public Fxns, a() and toString().

Lois inherits from Meg and all its public functions as well but, overrides the a() fxn of its super class.

So finally Lois has fxns a(), b() and toString().

Brian extends Lois and inherits all the above listed fxns of Lois, but overrides the b() and toString() fxns.

Stewie extends Brian and inherits all the fxns of Brian, but overrides the a() and toString() fxns.

In the Main driver fxn, we call a() and b() methods of all these classes but, the base class Meg has no b() and it is not extending any class so its not available in its scope.

This results in a compilation error.

Explanation:

7 0
3 years ago
At the Data Link Layer of the OSI Model, what type of address is used to identify the receiving host?
Natalka [10]

Answer:

Mac Address

Explanation:

The MAC address or Media Access Control  is a unique identifier that each manufacturer assigns to their devices that can connect to the network.  They consist of 48 bits in hexadecimal form, grouped into 12 pairs of characters and each character is formed by four binary numbers, generally separated by a colon. MAC addresses are used in the data link layer of the OSI model, specifically in the lower Medium Access Control layer. An example of a MAC address could be:

10: 68: c5: 5e: 27: 3f.

6 0
3 years ago
Where is the Name Manager dialog box found?
Sonbull [250]
 The Name Manager<span> dialog box is found, on the </span>Formulas<span> tab, in the </span>Defined Names<span> group, click </span>Name Manager<span>.</span>
6 0
3 years ago
Other questions:
  • Which data type uses more memory an integer or an unsigned integer?
    6·1 answer
  • You've decided to use a subnet mask of 255.255.192.0 with your 172.17.0.0 network to create four separate subnets. The network I
    13·1 answer
  • How can I become front end developer
    15·2 answers
  • Typically, a programmer develops a programâs logic, writes the code, and ____ the program, receiving a list of syntax errors.
    6·1 answer
  • List the mistakes and the steps you need to take to minimize errors while typing. Incorporate these measures into your typing, t
    9·1 answer
  • Define a method pyramidVolume with double parameters baseLength, baseWidth, and pyramidHeight, that returns as a double the volu
    11·2 answers
  • In this lab, 172.30.0.0 represents the __________ network and 10.20.1.0 represents the _________ network.
    11·1 answer
  • 1. What are copyright laws? (6 points)
    15·1 answer
  • Suppose a process in Host C has a UDP socket with port number 6789. Suppose both Host A and Host B each send a UDP segment to Ho
    8·1 answer
  • What are the specifications for a mine shaft headgear ​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!