1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nadusha1986 [10]
3 years ago
8

What are the FIVE layers in the Internet protocol stack? What are the principal responsibilities of each of these layers?

Computers and Technology
1 answer:
kifflom [539]3 years ago
4 0

Answer: The internet protocol (IP) stack consist of the five layers and their functioning which are as follows:-

  • Application layer:- this layer is responsible for the type of service that is operating the system.It uses protocols like SMTP(Simple mail transfer protocol, FTP(file transfer protocol) etc.
  • Network layer:-this layer is used for the routing and transmission of the data packets through the routes. The exchange of IP packets is done between the server and the client.  
  • Transport layer:-It uses the  protocols TCP(Transmission control protocol) and UDP(User datagram protocol)for splitting the message and sending it to the recipient's address.
  • Data link layer:-it uses the point-to-point protocol for the sending the message from node to node.It also handles the data while inputting and outputting of the physical network.
  • Physical layer:-The working is done in a frame in which the the bits present in one node is transferred to other. It is used for defining the physical parameters like cables, etc.

You might be interested in
Can you help me with Computer issues graphic organizer?<br> Will give out brainly
tino4ka555 [31]
Just put for first: coding, graphics and for second : designing, writing
Third?: put all of the abov
6 0
3 years ago
Este tipo de software sirve para controlar e interactuar con el sistema operativo, proporcionando control sobre el hardware y da
attashe74 [19]

Answer: c

Explanation:

4 0
3 years ago
All organizations with a router at the boundary between the organization’s internal networks and the external service provider w
Anika [276]

Answer:

False

Explanation:

Access Control Lists (ACLs) are network filters used by routers and some switches to permit and restrict data flows in and out of network devices. When an ACL is implemented in a device or interface, the network device analyses data passing through it, compares it to the specification described in the ACL, and allows it the data to flow or prohibits it. One of the main reasons ACLs arre used is to provide a basic level of security for networks. If anything, the use of ACLs and their complexities bring about a delay in transmission through networks.

3 0
3 years ago
_______ allows you to add formatting such as shapes and colors to text. a. worddraw b. wordart c. worddesign d. wordshapes
4vir4ik [10]
Word Design is the answer.
4 0
3 years ago
Read 2 more answers
How do I cancel a friend request?
dusya [7]

Answer:

By pushing cancel

Explanation:

It's simple

3 0
3 years ago
Read 2 more answers
Other questions:
  • You can create a ____ partition to hold files that are created temporarily, such as files used for printing documents (spool fil
    11·1 answer
  • (PYTHON) Write a program that uses this technique to read a CSV file such as the one given above. Display the IDs and names of t
    14·1 answer
  • What functions do these WLAN applications and tools perform on WLANs: airmonng, airodump-ng, aircrack-ng, and aireplay-ng
    10·1 answer
  • To give your app users the ability to open your app directly from other apps by clicking a link, you should use:.
    11·1 answer
  • Examples of email use that could be considered unethical include _____.
    14·2 answers
  • What did Bakers wear (1) in the Portugal does (2) when was author was young ???
    10·1 answer
  • Question is on the picture thank you
    10·1 answer
  • Alfred works in the human resources department, and he uses a management information system to find applicants' résumés on the w
    7·1 answer
  • Assume the user types in 7 for x and 2 for y. What is output by the
    6·1 answer
  • Which technology keeps track of heart rate during a workout? (3 points) bathroom scale calculator pedometer wrist monitor
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!