It is difficult to generalize about protocols because they vary so greatly in purpose, but what properties do application protocols display?

What will be an ideal response?


Answers will vary. Define the start and end of a message. Define the syntax of a message.
Define the format of a message. Specify what to do with corrupted or improperly formatted
messages. Define interaction with the next lower layer. Define processes on either end of the
communication. Define the types of messages. Define the meaning of any informational
fields. Define how messages are sent and the expected response.

Computer Science & Information Technology

You might also like to view...

A button symbol has its own four-frame Timeline.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

________ is not a type of system worker thread.

a) Asynchronous b) Delayed c) Critical d) Hypercritical

Computer Science & Information Technology

What are the three primary goals of network security?

A) Integrity, confidentiality, availability B) Reliability, classified, accessibility C) Integrated, restricted, obtainable D) Veracity, dependability, unrestricted

Computer Science & Information Technology

Locking petty cash in a safe is an example of __________________________.

What will be an ideal response?

Computer Science & Information Technology