1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VLD [36.1K]
3 years ago
7

Suppose a TCP segment is sent while encapsulated in an IPv4 datagram. When the destination host gets it, how does the host know

that it should pass the segment (i.e. the payload of the datagram) to TCP rather than to UDP or some other upper-layer protocol
Computers and Technology
1 answer:
Naddika [18.5K]3 years ago
6 0

Answer and Explanation:

A host needs some datagram where TCP is encapsulated in the datagram and contains the field called a protocol. The size for the field is 8-bit.

The protocol identifies the IP of the destination where the TCP segment is encapsulated in a datagram.

The protocol field is 6 where the datagram sends through TCP and 17 where the datagram is sent through the UDP as well

Protocol with field 1 is sent through IGMP.

The packet is basic information that is transferred across the network and sends or receives the host address with the data to transfer. The packet TCP/IP adds or removes the field from the header as well.

TCP is called connection-oriented protocol as it delivers the data to the host and shows TCL receives the stream from the login command. TCP divides the data from the application layer and contains sender and recipient port for order information and known as a checksum. The TCP protocol uses the checksum data to determine that data transferred without error.

You might be interested in
Which is a good way to improve your credit score
labwork [276]
Pay your bills and don't be late
8 0
4 years ago
Can someone tell me how to hit on a link on Brainly to see the answer
3241004551 [841]
No, please do not hit on links. they're viruses i'm pretty sure.
7 0
3 years ago
Read 2 more answers
Just five types of pointing device,list
posledela

Answer:

five types of pointing devices

Explanation:

Ponting devices

Pointing means point something and the pointing devices are the input /peripheral devices those are used to point the pointer on the screen. We do move cursor on the screen to open the files or any icon.

There are many types of pointing devices but these are quite common which are given below

  1. Computer mouse
  2. Finger on touch screen.
  3. Joystick.
  4. Leap Motion.
  5. Light pen (pen)

1.Mouse

Mouse is most common type of input device that is used for pointing the data on the screen. We press it with our hands and keep pointing the things.

There are three types of mouse

  1. optical mouse
  2. wireless mouse
  3. trackball mouse.

2. Finger on touch screen

In this type of movement the fingers are input devices those we use to see the movement of pointer on the screen and this is most common in this century.

3.Joystick.

Joystick is another input device to point the cursor but it is mostly used in games. Children can use it smartly so it is inculcated in games usually.

4. Leap Motion

The Leap Motion (LM) controller is a latest 3D sensing device for hand posture interaction with a computer. It is having the capability sense the location of the fingers of the hands, as well as the palm position.

5.Light Pen

this is another pointing device which is mostly used to highlight and select the data on the screen.

Note: All of these above pointing devices are most common used now a days. These devices are having new  conventions day by day for the ease of user. This era is basically the era of IT ,so the use of computer must be so easy and conventional for the user so, the innovations and improvement in such devices is made side by side.

3 0
3 years ago
A user has been given Full Control permission to a shared folder. The user has been given Modify permission at the NTFS level to
aev [14]

Answer:

<em>Full control</em>

Explanation:

Full control permission enables users to access, compose, alter, and  remove documents and sub-folders.

Additionally, for all documents and  sub-directories, users can alter permissions settings.

Users are able to modify permissions and take file possession.

8 0
4 years ago
Write a program that first gets a list of six integers from input. The first five values are the integer list. The last value is
Andrew [12]

Answer:

import java.util.*;

public class Main

{

public static void main(String[] args) {

    Scanner input = new Scanner(System.in);

   

    int[] arr = new int[5];

   

    System.out.println("Enter values for integer list: ");

    for (int i=0; i<5; i++){

        arr[i] = input.nextInt();

    }

   

    System.out.print("Enter the threshold: ");

    int t = input.nextInt();

   

    outputIntsLessThanOrEqualToThreshold(arr, t);

   

}

public static void outputIntsLessThanOrEqualToThreshold(int[] arr, int threshold){

   

    for (int x: arr){

        if (x<threshold)

            System.out.print(x + " ");

    }

}

}

Explanation:

Create a function called outputIntsLessThanOrEqualToThreshold that takes two parameters, arr and threshold

Check each element in the arr. If they are smaller than the threshold, print the element

Inside the main:

Initialize the array with user inputs and get the threshold value

Call the outputIntsLessThanOrEqualToThreshold function with the entered array numbers and threshold value

6 0
3 years ago
Other questions:
  • What career is likely to have to highest salary
    14·2 answers
  • Write a method named lastFirst that accepts a string as its parameter representing a person's first and last name. The method sh
    13·1 answer
  • What cell phone technology is the most popular in the united states?
    8·2 answers
  • Jorge is sending a large image file to a friend as part of a shared classroom project. Which of the following is most likely tru
    11·1 answer
  • Write a SELECT statement that selects all of the columns for the catalog view that returns information about foreign keys. How m
    6·1 answer
  • The northern half of this continent is primarily rainforest and savanna.
    5·1 answer
  • Which of the following is true of e-learning and computer-based training (CBT)?
    13·1 answer
  • In dynamic programming, the technique of storing the previously calculated values is called A. Saving value property B. Storing
    7·1 answer
  • Select three physical forms of storage. USB drive Primary cache Magnetic storage Secondary cache Dynamic RAM Optical drive
    7·2 answers
  • Give me reasons why Harry Potter is bad and anime is better
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!