1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anettt [7]
3 years ago
12

Tcp takes a three-step approach to establishing a reliable communication. first, from the transport layer of the sending device

a request packet is transmitted to the receiving device's transport layer asking if a session can be established. second, if available, the receiving device sends a packet back to the sending device indicating that it is available for communication. what is the third step?
Computers and Technology
1 answer:
tiny-mole [99]3 years ago
4 0

TCP takes a three-step approach to establishing a reliable communication.

First, from the transport layer of the sending device a request packet is transmitted to the receiving device's transport layer asking if a session can be established.

Second, if available, the receiving device sends a packet back to the sending device indicating that it is available for communication.

Third, the sending device begins to send its data to the receiving device.

You might be interested in
25 Points Asap <br> Write a Java program named Light.java that displays a light bulb shown below:
Marizza181 [45]

Answer:

I DON'T EVEN UNDERSTAND

3 0
3 years ago
your computer running Windows 10 is doing some very strange things with operating system you are fairly certain it is not a hard
AlekseyPX
It might be a virus, when my computer starts going crazy i just bought a fixme stick and they work amazing or trying getting an expert to fix it if it worse
6 0
3 years ago
Read 2 more answers
Which of the following is something all models use to determine relationships?
Aleks [24]

Answer:

Math

Explanation:

Which of the following is something all models use to determine relationships?

The answer would be math.

8 0
4 years ago
Barry discovers that an attacker is running an access point in a building adjacent to his company. The access point is broadcast
qwelly [4]

Answer: Option (A) is correct

Explanation:

Evil twin is known as a fraudulent point of access in a Wi-Fi which tends to  appear to be honest and legitimate but is known as a set up to oversee on the wireless communications. Evil twin is referred to as the WLAN equal of a phishing scam.  This kind of attack is mostly used in order to steal passwords of an unsuspecting users, that is done either by by phishing or by monitoring the connection, this mostly involves developing a fake web site and thus luring people.

8 0
3 years ago
What will help the programmer understand what’s going on in the program?
Over [174]

Answer:

Programming languages to help solve algorithms

Explanation:

6 0
3 years ago
Other questions:
  • Marjorie is a 72-year-old woman who is having difficulties with cooking and bathing. Jorge provides Marjorie with tools and tech
    12·1 answer
  • You have just installed a SOHO router in a customer's home and the owner has called to say his son is complaining that Internet
    5·1 answer
  • Differentiate between the broadcasting and telecommunication
    5·1 answer
  • WILL MARK BRAINIEST
    12·1 answer
  • In an oblique drawing, which lines can be measured accurately, if there is no foreshortening?
    10·1 answer
  • Pick one of the following scenarios and
    6·1 answer
  • Computer identity theft differs from theft in the real world in what major way?
    11·2 answers
  • Examine the weather map.
    12·2 answers
  • Write an SQL query to list all the records from the member and branch tables.
    6·1 answer
  • what technique, in which multiple phones take turns sharing a channel, does the global system for mobile communications (gsm) us
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!