1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
deff fn [24]
3 years ago
14

Do network packets take the shortest route?

Computers and Technology
2 answers:
Sergio039 [100]3 years ago
5 0

Answer:

The packet will take a shorter path through networks 2 and 4

Naddika [18.5K]3 years ago
4 0

Answer:The packet will take a shorter path through networks 2 and 4, but networks 1, 3, and 5 might be faster at forwarding packets than 2 and 4. These are the kinds of choices network routers constantly make.What is shortest path routing in computer networks?

The goal of shortest path routing is to find a path between two nodes that has the lowest total cost, where the total cost of a path is the sum of arc costs in that path. For example, Dijikstra uses the nodes labelling with its distance from the source node along the better-known route.

Explanation:

You might be interested in
Why do attackers tend to target public or private Wi-fi networks?
Anika [276]

Answer:

The answer to this question is given below in this explanation section.

Explanation:

A free WiFi connection in a public space can seem like a lifesaver when you are on the go.But if you decide to use public WiFi just be aware that you could be making yourself an easy target for hackers and putting your information and more at risk.

one of the dangers of using a public WiFi network is that data over this type of open  connection is often encrypted and  unsecured ,leaving you vulnerable to a man in the middle attack.It when a cyber criminal exploits a security  flaw in the network to intercept data

  • Avoid connecting to public WiFi connection. i if you must use a public WiFi hotpots also use a virtual privater network to secure your connection.
  • Do not  log in to password protected websites that contains sensitive information when using a public WiFi connection for example banking and social networking sites or even email.
  • Keep your software patched and up to date and all your devices even your mobiles ones to avoid any potential infection by viruses or malware if you do use unsecured public WiFi.

5 0
3 years ago
My brainly is no hello friend , i need you can you help me, please okay
Pachacha [2.7K]

Answer:

I'll try to help you!

what do you need?

Explanation:

I hope you have an amazing day!

✧◝(⁰▿⁰)◜✧

8 0
3 years ago
Read 2 more answers
Which option is used in emails to inform the recipient that they should exercise discretion in accordance with sharing the conte
Kay [80]
Priority levels hehe good luck!
5 0
3 years ago
I need help pleaseeee
MrRissso [65]

Answer:

Explanation:

I  ....

6 0
3 years ago
he transport layer on the destination host O reassembles the application message if it has been fragmented O removes the transpo
Dafna1 [17]

Answer: Both A and B

Explanation: Transport layer is the level of the OSI model which is helpful in maintaining the overall network communication.The application process that is being executed in the layers of architecture gets logical communication through transport layer.

It has the ability to connect the data that has been divided into section for the transportation.It can also act on the transport header ,which finds the transmission flow of specific data when not required.

4 0
3 years ago
Other questions:
  • Radiation requires a heated liquid to transfer energy. Please select the best answer from the choices provided T F
    10·2 answers
  • What runs a network, steering information between computers and managing security and users?
    11·1 answer
  • How do i start makeing a Character in the Unreal Game Engine
    14·2 answers
  • What provides quality education for students
    14·1 answer
  • Which of the following actions might contribute to recommendations you see online?
    6·1 answer
  • What error occurs when you perform an illegal math operation such as divide by zero
    13·1 answer
  • Impanation stage contain ​
    10·1 answer
  • Write down the bit pattern in the fraction of value 1/3 assuming a floating point format that uses Binary Coded Decimal (base 10
    10·1 answer
  • 1. Implement the function dict_intersect, which takes two dictionaries as parameters d1 and d2, and returns a new dictionary whi
    8·1 answer
  • A bank wants to reject erroneous account numbers to avoid invalid input. Management of the bank was told that there is a method
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!