Question

which layer protocols are responsible to move data from one local network to another local network...

which layer protocols are responsible to move data from one local network to another local network within an internetwork?
0 0
Add a comment Improve this question Transcribed image text
Answer #1

layer 3 protocols are responsible to move data from one local network to another local network within an internetwork

layer 3 OR network layer

Add a comment
Know the answer?
Add Answer to:
which layer protocols are responsible to move data from one local network to another local network...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 12 What is a function of the transport layer? contains protocols for process-to-process communications provides a...

    12 What is a function of the transport layer? contains protocols for process-to-process communications provides a data path or route to move messages through an internetwork exchanges frames between network devices O executes ordered and reliable delivery of data between source and destination hosts

  • Network layer protocols provide a logical communication between hosts, whereas transport layer protocols provide a logical...

    Network layer protocols provide a logical communication between hosts, whereas transport layer protocols provide a logical communication between processes running on these hosts. To help you understand these concepts, please read the following and answer the simple questions. Consider two houses on the east and west side, with each house being home to some kids. The kids of the west household are cousins of the kids in the east household. Each kid writes each cousin every week a letter, with...

  • Protocols (8 points) Aliens have tampered with your computer! They garbled some of the software responsible...

    Protocols (8 points) Aliens have tampered with your computer! They garbled some of the software responsible for your internet communica tions. You know that only one of the layers of the protocol stack has been affected. Which layer would you suspect in each of the following scenarios? a. You can view the source of HTML pages, but they don't display properly. b. You cannot seem to connect to any other computer at all. c. You can ping a computer across...

  • Networks work because of protocol standards. The transport layer has three prominent protocols, namely TCP and...

    Networks work because of protocol standards. The transport layer has three prominent protocols, namely TCP and UDP, both of which can be in use at the same time by different application laver protocols. Explain why we might allow several protocols to be active in one layer at the same time rather than mandate a single best-practice standard to each layer of the network stack.

  • 1. Which of the following protocols is used by a client to send an email message?...

    1. Which of the following protocols is used by a client to send an email message? a. HTTP SMTP b. FTP d. RDP 2. What is the most common network topology today? a/Star c. Hub Ring d. Mesh 3. A client/server network is the simplest network model. a/ True O False 4. Which client server application allows an administrator to control a remote computer, but does not encrypt or secure the communication between client and server? A Telnet C. Remote...

  • 1. Consider a neural network, which contains one hidden layer and an output layer with one...

    1. Consider a neural network, which contains one hidden layer and an output layer with one output unit. Let the hidden units have negative sigmoid as the activation function, which is formulated as 1 n(v) 1 + exp(-1) and the output unit has a linear activation function in which the output is equal to the activation input). (a) Show that the derivative of the negative sigmoid obeys the following relation dn(v) dv = n(v)(1 + n(v)) (b) Let the cost...

  • What happens when the packets sent from a computer (at the application layer) reach various network...

    What happens when the packets sent from a computer (at the application layer) reach various network nodes – local computers, remote computers, local attached routers/switches, remote routers/switches, hubs, etc.? Please discuss what network nodes of different types know about the application file being transmitted (based on what information is provided in the header at the OSI layer at which that node operates) at each level of reassembly (i.e., viewing the frame packet only, reassembling frame packets to recreate the IP...

  • When does Transport Layer Protection need to be used? (A) Accessing customer data on a local...

    When does Transport Layer Protection need to be used? (A) Accessing customer data on a local corporate network (B) Communicating private messages over Wifi Direct (C) Transferring money in a banking app on a LTE network

  • 1ai. Why layered network architectures. Give a concise description of how layer networks are implemented. ii....

    1ai. Why layered network architectures. Give a concise description of how layer networks are implemented. ii. Describe the function and services offered by TCP/IP protocols. iii. The following terms have been used to describe the hypertext transfer protocol(HTTP) protocol: client-server, stateless, non-persistent and persistent connection. Describe each term. iv. Identify session layer and presentation layer function in the HTTP protocol. b. Suppose a computer is moved from one department to another. Answer yes or no to the following questions and...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT