1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aliya0001 [1]
3 years ago
13

Network is a process by which several protocols evolve to form a single product.

Computers and Technology
1 answer:
astraxan [27]3 years ago
6 0

Answer:

Is this like a true or false thing or just a statement?

You might be interested in
Describe the need for switching and define a switch. List the three traditional switching methods. Which are the most common tod
nirvana33 [79]

Network switching is an essential aspect of computer networking. Interconnecting multiple devices can sometimes cause issues in a network. The idea of network switching comes in when we want to offer practical solutions to these issues. Data coming into an input port (ingress) and data leaving out (egress) to its final destination are always achieved through network switching. A switched network must have a switch that acts as the medium through which data passes to its final destination. It can connect your computers, servers, and printers, creating a way to share resources.

The three main traditional switching techniques are circuit switching, message switching, and packet switching. However, the most common models used today are circuit switching and packet switching. They are used to connect communicating devices together within an enterprise network. Let us learn a little bit more about them. The similarities between these two are very generic. They both would probably require the destination address of the device you are sending the packets to. However, there are several distinct differences between them.

Circuit switching is connection-oriented while packet-switching technology is connectionless. The former is set up as a dedicated communication channel that is established before the sender and recipient can start to communicate. Data on the latter is fragmented into packets routed independently by network devices. The message in Circuit switching is received in the same way it was sent, while message sent as packets in Packet switching is received out of order and assembled upon arriving in its destination.

Inside a Switch’s hardware architecture is a TSI (Time-slot interchange) which is a known technology that uses time-division switching technology with the help of (TDM) time-division multiplexing. It has RAM that comes with several other memory locations and has input and output ports that uses the RAM to fill up with data that comes in through its input terminal. Its mechanism deals with how data comes in through input ports, stored and read out in RAM in sequences, and then sent out through output ports. We will discuss these ports down below

The four components are:

Input Ports – As discussed above, the input ports deal with how data comes in and how it is presented in the physical and data link layers of the OSI

Output Ports – It does the opposite of the functions of an input port

Routing protocol – In the network layer of the OSI, the routing protocol performs the functions of the table lookup. Decisions on the best path are made for network packets .

Switching Fabric – In packet switching, there are input and output line cards that are connected by a switch fabric. Most processing in switching fabrics is done in line cards.

8 0
4 years ago
If you want to include a long explanation about data in an Excel worksheet, what type of object can you use in the sheet?
djyliett [7]
I would assume the answer is A . Text Box
3 0
3 years ago
What is your understanding of the difference between an unconditionally secure cipher and a computationally secure cipher?
Maru [420]

Answer:

  The unconditionally secured is basically define as, the cipher content produced by the plan that doesn't contain enough data to decide the comparing plain message ,regardless of what number of figure content is accessible.

It is basically used to determine the uniquely plain content without knowing the actual availability of the cipher.

The computationally secure cipher is the encryption scheme which is basically required the time for breaking the cipher which exceeds the helpfulness lifetime of that data.  The expense of breaking the figure surpasses the estimation of scrambled data

5 0
3 years ago
A token is combination of hardware and software that acts as a gatekeeper and prevents unauthorized users from accessing private
snow_lady [41]
<h2>Answer:</h2>

A token is combination of hardware and software that acts as a gatekeeper and prevents unauthorized users from accessing private networks.

The statement given above is a FALSE statement.

<h2>Explanation:</h2>

Token is a term used in networking that can be defined as a combination of bits. Token are used in networks where computers are connected by ring topology or star topology. The token circulates from computer to computer. The computer having token can transfer data. As there is one token in a network so only one computer is able to transfer data at a time.

<h3>I hope it will help you!</h3>
5 0
4 years ago
What will be printed after the code below is ran: a = "123" b = "456" a = b + "123" b = a print(b + a)
Alex787 [66]

Answer:

1158

Explanation:

a = 123

b= 456

a = b + 123                           [a = 456 + 123 = 579]

b = a                                     [b = 579]

print(b + a)

<u>output</u>: 1158

P.S

If the variables have string values (because they have double-quotes around them), then the answer will be very different!

4 0
3 years ago
Other questions:
  • Recovery methods from a database failure​
    11·1 answer
  • How do you represent (decimal) integer 50 in binary
    7·1 answer
  • A switch has just arrived from Cisco. The switch has never been configured with any VLANs, but VTP has been disabled. An enginee
    13·1 answer
  • If you need to set up direct deposit, which information from your check would you likely need?
    7·2 answers
  • marco wants to create a heading that is bold and italic to make it really stand out on his webpage. he's typed in the code
    12·2 answers
  • What is a new technology in computer science that is emerging to solve a social, economic, or technological problem.
    9·1 answer
  • Michael’s team is presenting a robot before their examiners. What do they need which is a definitive description of the final pr
    6·1 answer
  • CP/IP over Ethernet supports basic frames with a total size of up to 1518 bytes (including both the message payload and headers)
    11·1 answer
  • State and explain ten features of the standard toolbar as in computing.
    14·2 answers
  • Is anyone else's pa.dl.et not working??? It says The requested URL / was not found on this server. That’s all we know.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!