1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marianna [84]
3 years ago
5

What connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that the

data was recieved or to request the retransmission of missing data?
Computers and Technology
2 answers:
Leviafan [203]3 years ago
7 0

Answer:

upper-layer connection-oriented protocols

Explanation:

Upper-layer connection-oriented protocols keep track of the data received and can request retransmission from the upper-level protocols on the sending host.

Semenov [28]3 years ago
4 0

Answer:

An upper-layer, connection-oriented protocol or service

Explanation:

Connectionless acknowledgements are used to request retransmission.

Upper-layer connection-oriented protocols keeps track of the data received and can request retransmission from the upper-level protocols on the sending host.

A Network layer IP protocols manage the communication sessions if connection-oriented transport services are not available.

The best-effort delivery process guarantees that all packets that are sent are received.

Upper-layer connection-oriented protocols keep track of the data received and can request retransmission from the upper-level protocols on the sending host.

You might be interested in
Preciso de ajudar para resolver esse exercício, é para amanhã cedo!!<br><br> Em Dev C++
LenKa [72]
Bbbbbbbbbbbbbbbbbbbbbb
3 0
2 years ago
Read 2 more answers
*asap* Name one of the similarities between Word and Excel.
Yakvenalex [24]
The similarities are:  in both programs you can type letters, insert images, hyperlinks.
7 0
2 years ago
Which statement will remove 5:'softball' from the dictionary?
dimaraw [331]

Answer:

sports.pop(5)

Explanation:

edg 2020

4 0
3 years ago
Read 2 more answers
Write the following numbers in binary. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25
AfilCa [17]
0 1 10 11
Explanaition:
4 0
2 years ago
Create a web page for a fictitious company: Widgets Inc. has hired you to make a mock-up for their new website. They are on a bu
lina2011 [118]

Answer:

.20%

Explanation:

4 0
2 years ago
Other questions:
  • How has science fiction influenced technology
    7·2 answers
  • when two pieces of cui or other unclassified information are posted online together or attached together in an email and result
    5·1 answer
  • In which step of writing a program does a programmer first use a<br> compiler?<br> documentin
    6·1 answer
  • Do you think our attitude (whether positive or negative) is something we are born with or that we have power to control within o
    5·2 answers
  • Your desktop, internet explorer, and the media player can be started from this area on most computers
    9·1 answer
  • Exceptions can be handled in all of these ways except:
    6·1 answer
  • What is the name for a hardcoded value entered into a formula ?
    8·2 answers
  • What keyboard functions lets you delete words
    9·2 answers
  • Explain four sitting postures in a computer laboratory​
    9·1 answer
  • When you add encryption to a powerpoint presentation what does it do
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!