1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marianna [84]
3 years ago
5

What connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that the

data was recieved or to request the retransmission of missing data?
Computers and Technology
2 answers:
Leviafan [203]3 years ago
7 0

Answer:

upper-layer connection-oriented protocols

Explanation:

Upper-layer connection-oriented protocols keep track of the data received and can request retransmission from the upper-level protocols on the sending host.

Semenov [28]3 years ago
4 0

Answer:

An upper-layer, connection-oriented protocol or service

Explanation:

Connectionless acknowledgements are used to request retransmission.

Upper-layer connection-oriented protocols keeps track of the data received and can request retransmission from the upper-level protocols on the sending host.

A Network layer IP protocols manage the communication sessions if connection-oriented transport services are not available.

The best-effort delivery process guarantees that all packets that are sent are received.

Upper-layer connection-oriented protocols keep track of the data received and can request retransmission from the upper-level protocols on the sending host.

You might be interested in
If you Buy my group clothing in R.o.b.l.o.x for a donation i will make you brainliest
erastova [34]

Answer:kk ima do it

Explanation:

7 0
3 years ago
Read 2 more answers
In HTML, an opening tag and its closing tag must appear on the same line. True Or False​
DaniilM [7]

Answer:

the answer is true, you cannot break the element apart EVERR!!!!!

3 0
3 years ago
You are asked to provide a list of security groups a user is a member of. You write a script to pull the data from Active Direct
Whitepunk [10]

Answer:

I have no clue. I wish I could help though.

Explanation:

Sorry

7 0
3 years ago
The two most common mechanisms for sharing an ip address are a router or ____.
Karo-lina-s [1.5K]
ICS would bet he answer. 


Good luck! (:
8 0
3 years ago
What are the benefits of using presentations to organize and deliver information?
bearhunter [10]
Hello.

The benefits of using presentations to organize and deliver information are: it keeps things in order, keeps peoples attention longer, and it looks more professional.
4 0
3 years ago
Other questions:
  • Whichof the following is not a standard method called as part of the JSPlife cycle?jspInit()jspService()_jspService()jspDestroy(
    12·1 answer
  • What are the challenges of photographing at night? Why did the photographer “paint” the waterfall with the flashlight?
    9·1 answer
  • What uses HTML hypertext links that users can click to access different locations or information?
    11·1 answer
  • An automated search feature used by search engines to find results that match your search terms is called a spider or ?
    5·1 answer
  • Implement RandMultipByVal function, which gets one integervariable as its argument
    12·1 answer
  • How much time per day does the average U.S. youth spend watching television, playing video games, or using a computer?
    8·1 answer
  • Help with this quiz question thank you!
    12·2 answers
  • What is one of the main problems with shared web hosting? Select one: Sites that share resources are less susceptible to hacking
    8·1 answer
  • 2. The Warren Commission investigated the assassination of President _______________________ in 1964.
    6·1 answer
  • Your location has been assigned the 172.149.254.0 /24 network. You are tasked with dividing the network into 13 subnets with the
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!