1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anettt [7]
3 years ago
12

Tcp takes a three-step approach to establishing a reliable communication. first, from the transport layer of the sending device

a request packet is transmitted to the receiving device's transport layer asking if a session can be established. second, if available, the receiving device sends a packet back to the sending device indicating that it is available for communication. what is the third step?
Computers and Technology
1 answer:
tiny-mole [99]3 years ago
4 0

TCP takes a three-step approach to establishing a reliable communication.

First, from the transport layer of the sending device a request packet is transmitted to the receiving device's transport layer asking if a session can be established.

Second, if available, the receiving device sends a packet back to the sending device indicating that it is available for communication.

Third, the sending device begins to send its data to the receiving device.

You might be interested in
The binary number represented by the voltage graph below is
Delicious77 [7]

Answer:

4

Explanation:

5 0
3 years ago
Ok i dont wanna get bannddddddd so i have to ask a qustion<br> 2 plus 2
Evgesh-ka [11]

Answer:

22 or 4

Explanation:

:)

3 0
3 years ago
Read 2 more answers
In the MARS Marketing Management Simulation, the results of your marketing mix decisions:
azamat
C- are only occasionally affected by the decisions made by other teams
explanation
idk
3 0
3 years ago
What is Service Operations in ITIL​
Nostrana [21]

Explanation:

the objective of ITIL service operations is to make sure that IT services are delivered effectively and efficiently. the service operation life cycle stage includes the fulfilling of user requests, resolving service failure fixing problems and also carrying out routine operational tasks

7 0
4 years ago
Three broad categories of cryptographic algorithms are commonly used to create PRNGs: symmetric block ciphers, asymmetric cipher
RideAnS [48]

Answer:

True.

Explanation:

In generating PRNGs, several specific types of crypto algorithms will be widely will use: linear cipher block, nonlinear ciphers, as well as hash methods and authorization instructions in messages. So, that's why the following scenario is true about the cryptographic algorithms because this is a collection of several excellently defined however complicated mathematics techniques for encoding or decoding information.

7 0
3 years ago
Other questions:
  • In the spreadsheet example shown in chapter 5 ____ run from top bottom and are designated by a letter?
    12·2 answers
  • How are different types of cars similar and different?
    10·1 answer
  • Which of the following menu commands would you select to make a copy of an open file and rename it?
    15·1 answer
  • Write the function mystrchr(). the function has two parameters: a const char * s pointing to the first character in a c-style st
    14·1 answer
  • What is a boolean in Java
    5·1 answer
  • If, when asked for a date of birth, the user enters a future date, this error should be caught by a ________ check.
    8·1 answer
  • Which job role requires you to create user guides for computer products and services?
    11·1 answer
  • Please helpppppppppppppp
    11·1 answer
  • Anyone know why my desktop won’t turn on, I upgraded my ram and my monitor won’t turn on
    5·1 answer
  • Which type of inventory control is expensive but helps keep inventory especially secure? A. RFID tags B. Barcodes C. Visual merc
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!