1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yakvenalex [24]
3 years ago
6

Describe how both IPv4 and IPv6 access and utilize TCP as an upper-layer transfer protocol.

Computers and Technology
1 answer:
grin007 [14]3 years ago
6 0

Answer: Please see below as the answer is self-explanatory

Explanation:

For the TCP/IP protocol suite, the IP protocol is the Network (or Internet) layer (Layer 3 in the OSI model), and TCP is one of the possible options for the Transport Layer, (Layer 4 in the OSI model).

Now, how the transport layer is aware that the transport protocol to be used is TCP?

When the network layer receives a packet, reads the IP Header, processes it, and then, after stripping it from the packet, sends it to the immediate upper layer.

In the IP header, there is a field, that tells the network layer, which is the protocol that will take care of the packet payload once processed by the network layer.

This field, has different names in IPv4 and IPv6; It is called PROTOCOL in IPv4, and NEXT HEADER in IPv6.

It has a length of 8 bits, and the binary value included in it, identifies uniquely the type of upper-layer protocol to be used, being the same for the same protocol in both versions of IP protocol.

For TCP, it is 6 in binary: 00000110.

You might be interested in
Please help me idk I suck at this stuff ​
kap26 [50]
I would say the best clear answer is D, because A is a little bit unclear but I would say the best answer is D.

Why?

Mesh Topology is expensive considering more links as compared to Ring topology.


4 0
3 years ago
Unwanted or unneeded software included by manufacturers on new computers is called
Travka [436]
The answer is called bloatware. This is unneeded files that are actually on the computers which are already there even if it's new. It doesn't have any essential function and sometimes is a trial version. The application also adds up space which limits your free space storage. In other words, because it has no significant tasks to handle it is unnecessary, but it only serves as an additional profit to the company once it is purchased by the buyer.

Bloatware may also come especially in adware where a lot of extension applications are sometimes automatically installed after it is allowed to operate in just a click. The only solution for a bloatware is to uninstall it.  .
5 0
3 years ago
Computer-generated color images of the brain that provide information about brain activity and glucose metabolism are produced b
frozen [14]

The answer to this question is the PET scan. Positron Emission Tomography or PET scan is an imaging test that checks and trace for diseases in the body. This also shows how the body organs is functioning / working. The doctor can evaluate the function of the patients body by the 3D color images produced by the PET Scan.  

4 0
3 years ago
Explain how to uninstall a program.
yawa3891 [41]

GOOGLE IT.... THERE ARE ALOT OF STEPS...

3 0
4 years ago
Read 2 more answers
A website can contain a web form to collect registration details of a member who sign up to the website.
Vaselesa [24]

Answer

What you are needing here is a Point of entry system for website.

You can do this with Wordpress - where users can register to access. They sign up using wordpress and it's many plug ins.

They would have to choose a email and password to register and that would give them requirements to log back in.

WIth a password to their email you would be able to tell exactly how many times the came in and out of the website.  

Explanation:

5 0
3 years ago
Other questions:
  • Image files are grouped into two categories: _____.
    5·1 answer
  • Write a program that displays the following pattern: ..\.\* .\.\*** \.\***** ******* \.\***** .\.\*** ..\.\* That is, seven line
    8·1 answer
  • Which of these statements describes the difference between binary and decimal numbers?
    11·2 answers
  • Let’s define a new language called dog-ish. A word is in the lan- guage dog-ish if the word contains the letters ’d’, ’o’, ’g’ a
    6·1 answer
  • The following program segment is designed to compute the product of two nonnegative integers X and Y by accumulating the sum of
    9·1 answer
  • The memory unit of a computer has 256k words of 32 bits each. The computer has an instruction format with 4 fields: an opcode fi
    15·1 answer
  • Is a collection of information stored under a single nam​
    6·2 answers
  • WHAT TYPES OF ACTIVITIES ARE PERFORMED BY HEALTH CARE SOFTWARES
    8·1 answer
  • The function below takes two arguments: a string (name) and an integer (position). Complete the function so that it prints out t
    7·1 answer
  • Which of the following could be a method for an object-oriented class called Student?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!