1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rama09 [41]
3 years ago
11

Suppose Host A sends Host B a TCP segment encapsulated in an IP datagram. When Host B receives the datagram, how does the networ

k layer in Host B know it should pass the segment (that is, the payload of the datagram) to TCP rather than to UDP or to some other upper-layer protocol?
Computers and Technology
1 answer:
maw [93]3 years ago
3 0

Answer:

The 8-bit protocol field in the IP datagram contains information about which transport layer protocol the destination host should pass the segment to.

Explanation:

If host A sends a message to host B a TCP segment encapsulated in an IP datagram, for the network layer in Host B to know which transport layer protocol to pass the segment to, there is always an 8-bit protocol field available in the IP datagram with the necessary information of which of the transport layer protocol that the segment should be passed to by the destination host.

You might be interested in
Please help me with this question. I don’t get it
IRISSAK [1]

Answer:

d

Explanation:

i took the test

3 0
3 years ago
Read 2 more answers
Consider two communication technologies that use the same bandwidth, but Technology B has twice the SNR of technology A. If tech
MrRissso [65]

Answer:

55kbps

Explanation:

7 0
4 years ago
Today we will be making a Caesar Cipher to encrypt and decrypt messages.A Caesar Cipher is a simple cipher that translates one l
Len [333]

Answer:

#include <iostream>

#include <stdio.h>

#include <ctype.h>

using namespace std;

string

encrypt (string text, int s)

{  string resultingString = "";

 for (int i = 0; i < text.length (); i++)

   {      if (!isspace (text[i]))

{

  if (isupper (text[i]))

    resultingString += char (int (text[i] + s - 65) % 26 + 65);

  else

  resultingString += char (int (text[i] + s - 97) % 26 + 97);

}

     else

{

  resultingString += " ";

}

  }

 return resultingString;

}

string

decrypt (string text, int s)

{

 string resultingString = "";

 for (int i = 0; i < text.length (); i++)

   {

     if (!isspace (text[i]))

{

  if (isupper (text[i]))

    resultingString += char (int (text[i] + s - 65) % 26 + 65);

  else

  resultingString += char (int (text[i] + s - 97) % 26 + 97);

}

     else

{

  resultingString += " ";

}

   }

 return resultingString;

}

string upper(string str){

   for (int i=0;i<str.length();i++){

       str[i]=toupper(str[i]);

   }

   return str;

}

int

main ()

{

 string text = "This is test text string";

 

 int s = 3;

 string cipherText = "";

 string decipherText = "";

int menu=-1;

while (menu!=3){

   cout<<"1. Encrypt"<<endl;

   cout<<"2. Decrypt"<<endl;

   cout<<"3. Exit"<<endl;

   cin >>menu;

   cin.ignore();

   if(menu==1){

       cout<<"Enter Plain string "<<endl;

       getline(cin,text);

       text=upper(text);

         cipherText = encrypt (text, s);

           cout << "cipher text: " << cipherText << endl;

   }

   else if(menu==2){

       cout<<"Enter Encrypted string "<<endl;

       getline(cin,cipherText);

               cipherText=upper(cipherText);

         decipherText = decrypt (cipherText, 26 - s);

 cout << "decipher text: " << decipherText << endl;

   }

   else {

       cout<<"Not valid"<<endl;

   }

}

 return 0;

}

Explanation:

Display menu with options 1 encrypt, 2 decrypt, 3 exit. Write a function to translate string to upper case. Iterate through string and for each index use toupper function to translate alphabet to upper case and store it back to current index of string.On exiting from loop return string. Pass upper case string to encrypt function.

In encrypt function pass string by reference and shift value. Create an empty string resultingString. Iterate through string for each character check if its space, if its a space add it to resulting string otherwise using ascii values convert char to its ascii add shift value and subtract 65 (staring ascii value for capital alphabet) take modules with 26 for new character and than add 65 to get alphabet.Now add this alphabet to resulting string. Upon loop completion return resultingString.

For decryption use same function as encryption. We are using cyclic property to decrypt using same function therefor subtract shift from 26 and pass resulting shift value to decrypt function.

8 0
3 years ago
01001110 01100101 01110110 01100101 01110010 00100000 01100111 01101111 01101110 01101110 01100001 00100000 01100111 01101001 01
Scorpion4ik [409]

The Binary code translation are: Never gonna give you up\nNever gonna let you down\nNever gonna run around and desert you\nNever gonna make you cry\nNever gonna say goodbye\nNever gonna tell a lie and hurt you\n.

<h3>Binary code translation</h3>

Binary code can be defined as machine language which a computer understand.

This binary code are often used in digital computer and the  data code  mostly use are zero (0) and one (1) and  they help to represent information.

Therefore the Binary code translation are: Never gonna give you up\nNever gonna let you down etc.

Learn more about binary code here:brainly.com/question/9480337

#SPJ1

7 0
2 years ago
In a cellular network each cell is controlled by A tower what are theSe towers called?
Alex787 [66]

Answer: Base Stations

Base Stations are responsible for receiving and transmitting signals in a cellular network. These stations are equipped with an antenna or multiple antennas that allow the users to send and receive the calls and texts they send with their cellular phones.

Depending on the size and the range that a base station can reach, these are often stationed in multiple areas to allow cellular signals to constantly be connected to the cellular networks of the different service providers. Without these stations the customers of the providers will not have a signal to send or receive texts or calls.

7 0
4 years ago
Read 2 more answers
Other questions:
  • Given two int variables, i and j, which have been declared and initialized, and two other int variables, itemp and jtemp, which
    14·1 answer
  • Data mining is defined as: a)Separating data and programs such that each can be changed without changing the other b)Allowing ma
    5·1 answer
  • How can you re-engage users who have abandoned your app after their first use?
    12·2 answers
  • An automated search feature used by search engines to find results that match your search terms is called spider or
    13·1 answer
  • Which of these components is a part of the central processing unit (cpu) of a computer??
    14·1 answer
  • Let’s say you’re publishing a message with the Hootsuite Composer. The message contains a link to a landing page, and you want t
    9·1 answer
  • The date June 10, 1960, is special because when it is written in the following format, the month times the day equals the year:
    6·1 answer
  • the default name for the small icon that represents a web site or page, and is displayed in the browsers, typically at the begin
    9·1 answer
  • DOUBLE POINTS!! PLEASE HELP QUICKLY!!!!!
    15·2 answers
  • You can change the ____ or position of text within a document's margins.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!