Question

do the routers in public internet require TCP software? why or why not?

do the routers in public internet require TCP software? why or why not?

Homework Answers

Answer #1

Ans:

A router is connected to two or more data lines from various IP networks. When a data package arrives in one of the lines, the router examines the network address data in the package header to define the final target. Then, using the data in its routing table or routing system, it addresses the package to the following network on its mission.

A router is a networking tool that transmits data packages within computer networks. Routers make the traffic directing duties on the Internet. Data transferred over the internet, such as a web page is in the kind of data packets. A packet is normally transmitted from one router to another router within the networks that compose an internetwork (Eg.. the Internet) till it arrives at its target node.

How Internet Work?

The Internet runs into a package routing network in agreement with the Internet Protocol (IP), the Transport Control Protocol (TCP), and other protocols.

What is a protocol?

The Internet Protocol defines how PC should route data to other PC by connecting addresses onto the information it conveys.

What is a packet?

Data transmitted opposite the Internet has described a message. Before a message is transferred, it is the original division into multiple pieces known as packets. These packets are transferred separately from each other. The expected peak packet capacity is among the 1000 and 3000 letters. The Internet Protocol defines how messages should be packetized.

Where did these Internet routers originate from? Who claims them?

These routers began during the 1960s as ARPANET, a military venture whose objective was a PC network that was decentralized so the administration could get to and circulate data on account of a cataclysmic occasion. From that point forward, various Internet Service Providers (ISP) organizations have included routers onto these ARPANET routers.

There is no single proprietor of these Internet routers, but instead various proprietors: The administration organizations and colleges related to ARPANET in the good 'ole days and ISP partnerships like AT&T and Verizon later on.

Asking who possesses the Internet resembles asking who claims all the phone lines. Nobody element possesses them all; various substances own pieces of them.

Do bundles consistently make it to their destination?

The Internet Protocol makes no assurance that parcels will consistently show up at their destination. At the point when that occurs, it's known as a bundle misfortune. This ordinarily happens when a router gets more parcels it can measure. It has no choice other than to drop a few bundles.

But, the Transport Control Protocol (TCP) manages packet loss by making re-sending. It achieves this by becoming the target computer regularly transmit confirmation packets back to the origin computer showing how much of the message it has acquired and restored. If the target computer discovers there are missing packets, it gives a call to the origin computer requesting it to resend the lost packets.

While two PCs are talking through the Transport Control Protocol, we say there is a TCP connection among them.

How do TCP and IP differ?

TCP and IP are two different PC network protocols.

IP is the section that gets the address to which data is sent. TCP is accountable for data transfer once that IP address has been found.

It's reasonable to depart them, but there does indeed a point in creating a difference between TCP and IP. Because they're so often used together, “TCP/IP” and the “TCP/IP model” are now acknowledged terminology.

TCP/IP and Higher-Level Applications-

Several higher-level apps that eCommerce companies need to be intimate with using TCP/IP. These apps develop a higher layer of protocol language and are often packaged along with TCP/IP as a single "suite." Ex. cover:

  • HTTP (the Internet's Hyper-text Transfer Protocol)
  • FTP (the Internet's File Transfer Protocol)
  • Telnet, which enables logging on computers from remote locations
  • SMTP (Simple Mail Transfer Protocol)

Please do not forget to give a thumbs up.

Have a nice day!! ;)

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
How does the TCP/IP protocol promote decentralisation of internet?
How does the TCP/IP protocol promote decentralisation of internet?
Should the public schools require vaccination? why or why not
Should the public schools require vaccination? why or why not
We discussed TCP’s estimation of RTT. Why do you think TCP avoids measuring the SampleRTT for...
We discussed TCP’s estimation of RTT. Why do you think TCP avoids measuring the SampleRTT for retransmitted segments?
You manage a software company that requires internet bandwidth to produce output. Currently your company is...
You manage a software company that requires internet bandwidth to produce output. Currently your company is using 71% of its capacity, but is considering an expansion to utilize the additional bandwidth. Doing so will require $12,000 in additional expenditures per year forever, and generate $29,000 additional profits each year forever. The expansion will require a one time cost of $100,000. What is the NPV of undertaking this expansion project? Assume a cost of capital of 15.1%
d   Do you think the public places unfair expectations on auditors? Why or why not?
d   Do you think the public places unfair expectations on auditors? Why or why not?
Why do population means require the use of the T score? Why are there 2 equations...
Why do population means require the use of the T score? Why are there 2 equations to determine a sample size of a proportion? Explain
Rock star, Prince, passed away in early 2016. Investigate public information available on the internet and...
Rock star, Prince, passed away in early 2016. Investigate public information available on the internet and make a posting regarding the effectiveness of his estate planning. Does it appear that his estate was properly protected for his heirs? Why or why not?
1. Describe the IPv4 and IPv6 datagram format. What is datagram encapsulation? 2. How do routers...
1. Describe the IPv4 and IPv6 datagram format. What is datagram encapsulation? 2. How do routers forward IP datagrams and delivery them to destination? 3. What is ICMP? Describe ICMP's role in the network.
Do you agree with having a public funded healthcare system in the US why or why...
Do you agree with having a public funded healthcare system in the US why or why not? Is quality and cost directly correlated? Should it be?
With the proliferation of Internet devices, malicious software, also called malware for short (viruses, worms, and...
With the proliferation of Internet devices, malicious software, also called malware for short (viruses, worms, and Trojan horse), is used for stealing, disrupting or even destroying sensitive information and is continuously on the rise. Which of these malicious software has been more devastating recently and how could it be prevented or contained?