Question

Explain how various types of messages travel through network layers from the origination to their destination....

Explain how various types of messages travel through network layers from the origination to their destination. Include any analog to digital converting steps if needed and determine possible reasons as to why the network has slowed down.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answer)

There are different forms of messages like normal text, media, video, email, etc while if there would have been a single communication then no other messages would have been transmitted in this form and hence no other device devices would be able to receive or send and hence the data transfer would have been in progress always.

There should be normal text and video are having multiple communication which is interleaved and in turn provide every user a part of their bandwidth, while there is some other message type like media file, video, which undergo segmentation where the communication process is broken for transmission. There is another form called the multiplexing wherein the pieces are interleaved as they keep traversing media.

Mostly segmentation is used for enhancing the reliability of network communication and the separate pieces of every message will not require to travel the same pathway via the network from source to the destination.

The data or the messages are first converted into binary digits or bits which traverse the pathway while mostly not the same pathway via the network from that of the source to destination which ensures the piece of the message would be successfully delivered.

Some of the processes involved for network communication are 1) routing, 2) encapsulation, 3) decapsulation and 4) addressing.

It is in the network layer where the messages are created by that of the application layer and finally turned and broken into smaller messages, the route is then identified and information is passes using the data link layer.

Reason for slowness is as below:

1) When there is an imperfect architectural design

2) In case there is a speed mismatch, or if the path is corrupted and has malware

3) When the data package has been misused

4) When there is poor cable associated and is the equipment is malfunctioned

5) If there is a junk software present

Please comment if you need any other inputs.
Share a like if you find the answer helpful. This would help us learn and share our learning better.
Thank you.

Add a comment
Know the answer?
Add Answer to:
Explain how various types of messages travel through network layers from the origination to their destination....
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Pitch: The pitch was prepared by doing an online research browsing through various international travel sites,...

    Pitch: The pitch was prepared by doing an online research browsing through various international travel sites, the search was predominantly related to kind of services offered by airlines, hotels and travel agents to support the international travelers which include both business and leisure travelers. The negative is that the industry is changing constantly so we had to update our pitch at regular intervals. There are many new facilities for the international traveler and value-added services added every day. To keep...

  • Microbiology: 1. Explain how you would use Robert Koch's postulates to determine that Bacterium HU220 is...

    Microbiology: 1. Explain how you would use Robert Koch's postulates to determine that Bacterium HU220 is the causative agent of the disease XYZ. Also, explain why Koch's postulates cannot be fulfilled for some microorganisms. 2. Discuss the role of phages in bacterial pathogenesis. 3. The complement system functions as a mediator of both innate and adaptive host defense mechanisms. Given your knowledge of host-defense system, discuss the role played by the complement system in both adaptive and innate immunity, 4....

  • Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable...

    Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable detail how a company leverages an ERP system and how its operations are improved after installing an ERP system like SAP. Explain how a supply chain management system helps an organization make its operations more efficient What is Upstream and Downstream management of the supply chain? Explain the concept of “Supply Network”, its benefits, and how technology made this concept available Explain the difference...

  • 1. List some of the various communities to which you belong (organizations, work, hobbies, fields of...

    1. List some of the various communities to which you belong (organizations, work, hobbies, fields of expertise, family). Give examples of some of the behavioral and language characteristics particular to each group? For instance, do you speak to your job supervisor in the same way you speak to your child or your best friend? Why might you interact with members of different communities differently?    2.What are some of your past experiences with writing? Please explain what you like and...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • A test specification provides designers with what needs to be known in order to perform a...

    A test specification provides designers with what needs to be known in order to perform a specific test, and to validate and verify the requirement to be tested. The test script is divided into the test script, which is the generic condition to be tested, and one or more test cases within the test script. Provide a test script and test case for at least 3 of your requirements identified in your requirements specification. Provide the following format for an...

  • Task 2 - Trapezium Rule (Maximum Mark 10) Find the equation of the line through the...

    Task 2 - Trapezium Rule (Maximum Mark 10) Find the equation of the line through the points A(Y) and (.ya) and find an expression for the area under this line between the points A and B. Explain carefully how your result can be used to prove the general formula for the Trapezium Rule. Notes: • This part of the assignment is testing that you can find the equation of a line and use this to derive other formulae. Marking Criteria...

  • In this lab, we’ll investigate the 802.11 wireless network protocol. Follow the instructions and answers questions...

    In this lab, we’ll investigate the 802.11 wireless network protocol. Follow the instructions and answers questions 7 - 10. http://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip In this lab, we'll investigate the 802.11 wireless network protocol. Before beginning this lab, you might want to re-read Section 6.3 in the text. Since we l1 be delving a bit deeper into 802.11 than is covered in the text, you might want to check out "A Technical Tutorial on the 802.11Protocol," by Pablo Brenner (Breezecom Communications) http://www.sss-mag.com/pdf802_11tut.pdf, and "Understanding...

  • A new version of the operating system is being planned for installation into your department’s production...

    A new version of the operating system is being planned for installation into your department’s production environment. What sort of testing would you recommend is done before your department goes live with the new version? Identify each type of testing and describe what is tested. Explain the rationale for performing each type of testing. [ your answer goes here ] Would the amount of testing and types of testing to be done be different if you were installing a security...

  • Notes for lab dc02-Resistors and the Color Code will skip are Part 2 e, g: Part 4; Exercises 2, 4,5,6 an...

    Notes for lab dc02-Resistors and the Color Code will skip are Part 2 e, g: Part 4; Exercises 2, 4,5,6 and 3. It is important to answer the exercises correctly in each labl you should include the appropriate prefix for the unit in the Numerical Value We will not be Volt using the Volt-Ohm meter (VOM) for this lab, so skip the parts that ask for VOM measurements. The parts we You do need to complete Exercises1 Note that in...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT