SlideShare a Scribd company logo
Please follow the data :
There are some flag and the control characters that are usewd in the fields of communication to
maintain a synchronous data from the sender and the receiver. Some of the flags described are
the ACK and NAK flags or the control characters. These characters will generally have the
standard decimal values that maintain.
a) ACK : It is the flag value that assigns to acknowledge indicating the result of the process that
has been initiated from the user or the sender. It also describes that the process was successful. It
is the abbrevation of Acknowledgement.
The decimal value for the ACK flag is given by (6)10. So from the conversion of decimal to
binary we get the values of the ACK flag as (0110)2.
Now the hexadecimal value can be given as the same as the values for the hexa and the binary
would be same till the value of 15 as though they describr the same point. So the hexadecimal
value of the ACK flag is (6)16.
b) NAK : It is a flag or a boolean value that describes the sender or the user indicating that the
data has not been received correctly or the data has been tampered or lost over the network. It is
the abbrevation of Negative Acknowledgement.
The decimal value that is listed accordingly for the characters is given by (21)10. So the binary
format of the NAK flag is givem by (0001 0101)2.
Now that converting it to the hexadecimal value we get the NAK flag value as 15(16).
Hope this is helpful.
Solution
Please follow the data :
There are some flag and the control characters that are usewd in the fields of communication to
maintain a synchronous data from the sender and the receiver. Some of the flags described are
the ACK and NAK flags or the control characters. These characters will generally have the
standard decimal values that maintain.
a) ACK : It is the flag value that assigns to acknowledge indicating the result of the process that
has been initiated from the user or the sender. It also describes that the process was successful. It
is the abbrevation of Acknowledgement.
The decimal value for the ACK flag is given by (6)10. So from the conversion of decimal to
binary we get the values of the ACK flag as (0110)2.
Now the hexadecimal value can be given as the same as the values for the hexa and the binary
would be same till the value of 15 as though they describr the same point. So the hexadecimal
value of the ACK flag is (6)16.
b) NAK : It is a flag or a boolean value that describes the sender or the user indicating that the
data has not been received correctly or the data has been tampered or lost over the network. It is
the abbrevation of Negative Acknowledgement.
The decimal value that is listed accordingly for the characters is given by (21)10. So the binary
format of the NAK flag is givem by (0001 0101)2.
Now that converting it to the hexadecimal value we get the NAK flag value as 15(16).
Hope this is helpful.

More Related Content

Similar to Please follow the data There are some flag and the control charac.pdf

Introduction to the OSI 7 layer model and Data Link Layer
Introduction to the OSI 7 layer model and Data Link LayerIntroduction to the OSI 7 layer model and Data Link Layer
Introduction to the OSI 7 layer model and Data Link LayerVNIT-ACM Student Chapter
 
Transport_Layer_Protocols.pptx
Transport_Layer_Protocols.pptxTransport_Layer_Protocols.pptx
Transport_Layer_Protocols.pptx
AnkitKumar891632
 
Jaimin chp-3 - data-link layer- 2011 batch
Jaimin   chp-3 - data-link layer- 2011 batchJaimin   chp-3 - data-link layer- 2011 batch
Jaimin chp-3 - data-link layer- 2011 batch
Jaimin Jani
 
Mixed Signal Verification of a Voltage Regulator using a State Space approach...
Mixed Signal Verification of a Voltage Regulator using a State Space approach...Mixed Signal Verification of a Voltage Regulator using a State Space approach...
Mixed Signal Verification of a Voltage Regulator using a State Space approach...Raj Mitra
 
Dos on 802.11 and other security issues ( Case Study )
Dos on 802.11 and other security issues ( Case Study ) Dos on 802.11 and other security issues ( Case Study )
Dos on 802.11 and other security issues ( Case Study )
Shrobon Biswas
 
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptxU2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
k2w9psdb96
 
Visualizing C2_MLADS_2015
Visualizing C2_MLADS_2015Visualizing C2_MLADS_2015
Visualizing C2_MLADS_2015Todd Lanning
 
MSB-Remote procedure call
MSB-Remote procedure callMSB-Remote procedure call
MSB-Remote procedure call
MOHD. SHAHRUKH BHATI
 
transport protocols
transport protocolstransport protocols
transport protocols
Srinivasa Rao
 
How packet data travel over network
How packet data travel over networkHow packet data travel over network
How packet data travel over networkRaisa Anjani
 
aktu-computer-network-quantum-rotated.pdf
aktu-computer-network-quantum-rotated.pdfaktu-computer-network-quantum-rotated.pdf
aktu-computer-network-quantum-rotated.pdf
SaranshChauhan15
 
Unit 2
Unit 2Unit 2
Unit 2
APARNA P
 
datalinklayermukesh
datalinklayermukeshdatalinklayermukesh
datalinklayermukesh
TamiratDejene1
 
Flow control and error control techniques in the data link layer protocol
Flow control and error control techniques in the data link layer protocolFlow control and error control techniques in the data link layer protocol
Flow control and error control techniques in the data link layer protocol
mdmuaj
 
Data link layer
Data link layer Data link layer
Data link layer
Mukesh Chinta
 
06.pptx
06.pptx06.pptx
06.pptx
LibaBali
 
Data Encoding for Wireless Transmission
Data Encoding for Wireless TransmissionData Encoding for Wireless Transmission
Data Encoding for Wireless TransmissionSean McQuay
 
Unit 3 - Data Link Layer - Part A
Unit 3 - Data Link Layer - Part AUnit 3 - Data Link Layer - Part A
Unit 3 - Data Link Layer - Part A
Chandan Gupta Bhagat
 
IEEE Connect 2020 Novel TLS signature extraction for Encrypted malware detection
IEEE Connect 2020 Novel TLS signature extraction for Encrypted malware detectionIEEE Connect 2020 Novel TLS signature extraction for Encrypted malware detection
IEEE Connect 2020 Novel TLS signature extraction for Encrypted malware detection
madhucharis
 

Similar to Please follow the data There are some flag and the control charac.pdf (20)

Introduction to the OSI 7 layer model and Data Link Layer
Introduction to the OSI 7 layer model and Data Link LayerIntroduction to the OSI 7 layer model and Data Link Layer
Introduction to the OSI 7 layer model and Data Link Layer
 
Transport_Layer_Protocols.pptx
Transport_Layer_Protocols.pptxTransport_Layer_Protocols.pptx
Transport_Layer_Protocols.pptx
 
Jaimin chp-3 - data-link layer- 2011 batch
Jaimin   chp-3 - data-link layer- 2011 batchJaimin   chp-3 - data-link layer- 2011 batch
Jaimin chp-3 - data-link layer- 2011 batch
 
Mixed Signal Verification of a Voltage Regulator using a State Space approach...
Mixed Signal Verification of a Voltage Regulator using a State Space approach...Mixed Signal Verification of a Voltage Regulator using a State Space approach...
Mixed Signal Verification of a Voltage Regulator using a State Space approach...
 
Dos on 802.11 and other security issues ( Case Study )
Dos on 802.11 and other security issues ( Case Study ) Dos on 802.11 and other security issues ( Case Study )
Dos on 802.11 and other security issues ( Case Study )
 
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptxU2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
 
Ont mod 6
Ont mod 6Ont mod 6
Ont mod 6
 
Visualizing C2_MLADS_2015
Visualizing C2_MLADS_2015Visualizing C2_MLADS_2015
Visualizing C2_MLADS_2015
 
MSB-Remote procedure call
MSB-Remote procedure callMSB-Remote procedure call
MSB-Remote procedure call
 
transport protocols
transport protocolstransport protocols
transport protocols
 
How packet data travel over network
How packet data travel over networkHow packet data travel over network
How packet data travel over network
 
aktu-computer-network-quantum-rotated.pdf
aktu-computer-network-quantum-rotated.pdfaktu-computer-network-quantum-rotated.pdf
aktu-computer-network-quantum-rotated.pdf
 
Unit 2
Unit 2Unit 2
Unit 2
 
datalinklayermukesh
datalinklayermukeshdatalinklayermukesh
datalinklayermukesh
 
Flow control and error control techniques in the data link layer protocol
Flow control and error control techniques in the data link layer protocolFlow control and error control techniques in the data link layer protocol
Flow control and error control techniques in the data link layer protocol
 
Data link layer
Data link layer Data link layer
Data link layer
 
06.pptx
06.pptx06.pptx
06.pptx
 
Data Encoding for Wireless Transmission
Data Encoding for Wireless TransmissionData Encoding for Wireless Transmission
Data Encoding for Wireless Transmission
 
Unit 3 - Data Link Layer - Part A
Unit 3 - Data Link Layer - Part AUnit 3 - Data Link Layer - Part A
Unit 3 - Data Link Layer - Part A
 
IEEE Connect 2020 Novel TLS signature extraction for Encrypted malware detection
IEEE Connect 2020 Novel TLS signature extraction for Encrypted malware detectionIEEE Connect 2020 Novel TLS signature extraction for Encrypted malware detection
IEEE Connect 2020 Novel TLS signature extraction for Encrypted malware detection
 

More from mohammadirfan136964

2. Ligamentum arteriosumThe aortic arch loops over the left pulmo.pdf
2. Ligamentum arteriosumThe aortic arch loops over the left pulmo.pdf2. Ligamentum arteriosumThe aortic arch loops over the left pulmo.pdf
2. Ligamentum arteriosumThe aortic arch loops over the left pulmo.pdf
mohammadirfan136964
 
moles should be equal to complete consumption so.pdf
                     moles should be equal to complete consumption  so.pdf                     moles should be equal to complete consumption  so.pdf
moles should be equal to complete consumption so.pdf
mohammadirfan136964
 
TrueOne of the fundamental rules which control the PLSS system is .pdf
TrueOne of the fundamental rules which control the PLSS system is .pdfTrueOne of the fundamental rules which control the PLSS system is .pdf
TrueOne of the fundamental rules which control the PLSS system is .pdf
mohammadirfan136964
 
The stronger the attractions betweenparticles (mo.pdf
                     The stronger the attractions betweenparticles (mo.pdf                     The stronger the attractions betweenparticles (mo.pdf
The stronger the attractions betweenparticles (mo.pdf
mohammadirfan136964
 
a. It gives benzalacetone b. acetone will underg.pdf
                     a. It gives benzalacetone  b. acetone will underg.pdf                     a. It gives benzalacetone  b. acetone will underg.pdf
a. It gives benzalacetone b. acetone will underg.pdf
mohammadirfan136964
 
what is the mean, median, mode and the midrange for 191, 167,257,1.pdf
what is the mean, median, mode and the midrange for  191, 167,257,1.pdfwhat is the mean, median, mode and the midrange for  191, 167,257,1.pdf
what is the mean, median, mode and the midrange for 191, 167,257,1.pdf
mohammadirfan136964
 
Disodium malonate is an ionic sodium salt that is soluble in water..pdf
Disodium malonate is an ionic sodium salt that is soluble in water..pdfDisodium malonate is an ionic sodium salt that is soluble in water..pdf
Disodium malonate is an ionic sodium salt that is soluble in water..pdf
mohammadirfan136964
 
They showed that GFP protein could be expressed in the organisms wit.pdf
They showed that GFP protein could be expressed in the organisms wit.pdfThey showed that GFP protein could be expressed in the organisms wit.pdf
They showed that GFP protein could be expressed in the organisms wit.pdf
mohammadirfan136964
 
Thepossible mechanism by which a 75kD nuclear protein is imported in.pdf
Thepossible mechanism by which a 75kD nuclear protein is imported in.pdfThepossible mechanism by which a 75kD nuclear protein is imported in.pdf
Thepossible mechanism by which a 75kD nuclear protein is imported in.pdf
mohammadirfan136964
 
The neurons are nervous cells which play the central role in generat.pdf
The neurons are nervous cells which play the central role in generat.pdfThe neurons are nervous cells which play the central role in generat.pdf
The neurons are nervous cells which play the central role in generat.pdf
mohammadirfan136964
 
The parts of the respiratory tract which have nonkeratinized stratif.pdf
The parts of the respiratory tract which have nonkeratinized stratif.pdfThe parts of the respiratory tract which have nonkeratinized stratif.pdf
The parts of the respiratory tract which have nonkeratinized stratif.pdf
mohammadirfan136964
 
The impact of Brexit would be visible on the financial instituations.pdf
The impact of Brexit would be visible on the financial instituations.pdfThe impact of Brexit would be visible on the financial instituations.pdf
The impact of Brexit would be visible on the financial instituations.pdf
mohammadirfan136964
 
The alkaline earth metals burn in oxygen to form the monoxide, MO wh.pdf
The alkaline earth metals burn in oxygen to form the monoxide, MO wh.pdfThe alkaline earth metals burn in oxygen to form the monoxide, MO wh.pdf
The alkaline earth metals burn in oxygen to form the monoxide, MO wh.pdf
mohammadirfan136964
 
Squid molluscCrab ArthropodsCrayfish ArthropodsPolychaete .pdf
Squid molluscCrab ArthropodsCrayfish ArthropodsPolychaete .pdfSquid molluscCrab ArthropodsCrayfish ArthropodsPolychaete .pdf
Squid molluscCrab ArthropodsCrayfish ArthropodsPolychaete .pdf
mohammadirfan136964
 
The code you written is little bit confusing and lengthy. Here is th.pdf
The code you written is little bit confusing and lengthy. Here is th.pdfThe code you written is little bit confusing and lengthy. Here is th.pdf
The code you written is little bit confusing and lengthy. Here is th.pdf
mohammadirfan136964
 
Ques-1Normala flora and microbiota of nose and mouth are non-infe.pdf
Ques-1Normala flora and microbiota of nose and mouth are non-infe.pdfQues-1Normala flora and microbiota of nose and mouth are non-infe.pdf
Ques-1Normala flora and microbiota of nose and mouth are non-infe.pdf
mohammadirfan136964
 
Solution.According to IASB framework INCOME is the one of element .pdf
Solution.According to IASB framework INCOME is the one of element .pdfSolution.According to IASB framework INCOME is the one of element .pdf
Solution.According to IASB framework INCOME is the one of element .pdf
mohammadirfan136964
 
7. Answer is A.Cytochromes are protien containing iron or heme gro.pdf
7. Answer is A.Cytochromes are protien containing iron or heme gro.pdf7. Answer is A.Cytochromes are protien containing iron or heme gro.pdf
7. Answer is A.Cytochromes are protien containing iron or heme gro.pdf
mohammadirfan136964
 
A and C. RGB analog component video uses no compression, imposes no .pdf
A and C. RGB analog component video uses no compression, imposes no .pdfA and C. RGB analog component video uses no compression, imposes no .pdf
A and C. RGB analog component video uses no compression, imposes no .pdf
mohammadirfan136964
 
Public key authentication is the most secure colution and utilizes a.pdf
Public key authentication is the most secure colution and utilizes a.pdfPublic key authentication is the most secure colution and utilizes a.pdf
Public key authentication is the most secure colution and utilizes a.pdf
mohammadirfan136964
 

More from mohammadirfan136964 (20)

2. Ligamentum arteriosumThe aortic arch loops over the left pulmo.pdf
2. Ligamentum arteriosumThe aortic arch loops over the left pulmo.pdf2. Ligamentum arteriosumThe aortic arch loops over the left pulmo.pdf
2. Ligamentum arteriosumThe aortic arch loops over the left pulmo.pdf
 
moles should be equal to complete consumption so.pdf
                     moles should be equal to complete consumption  so.pdf                     moles should be equal to complete consumption  so.pdf
moles should be equal to complete consumption so.pdf
 
TrueOne of the fundamental rules which control the PLSS system is .pdf
TrueOne of the fundamental rules which control the PLSS system is .pdfTrueOne of the fundamental rules which control the PLSS system is .pdf
TrueOne of the fundamental rules which control the PLSS system is .pdf
 
The stronger the attractions betweenparticles (mo.pdf
                     The stronger the attractions betweenparticles (mo.pdf                     The stronger the attractions betweenparticles (mo.pdf
The stronger the attractions betweenparticles (mo.pdf
 
a. It gives benzalacetone b. acetone will underg.pdf
                     a. It gives benzalacetone  b. acetone will underg.pdf                     a. It gives benzalacetone  b. acetone will underg.pdf
a. It gives benzalacetone b. acetone will underg.pdf
 
what is the mean, median, mode and the midrange for 191, 167,257,1.pdf
what is the mean, median, mode and the midrange for  191, 167,257,1.pdfwhat is the mean, median, mode and the midrange for  191, 167,257,1.pdf
what is the mean, median, mode and the midrange for 191, 167,257,1.pdf
 
Disodium malonate is an ionic sodium salt that is soluble in water..pdf
Disodium malonate is an ionic sodium salt that is soluble in water..pdfDisodium malonate is an ionic sodium salt that is soluble in water..pdf
Disodium malonate is an ionic sodium salt that is soluble in water..pdf
 
They showed that GFP protein could be expressed in the organisms wit.pdf
They showed that GFP protein could be expressed in the organisms wit.pdfThey showed that GFP protein could be expressed in the organisms wit.pdf
They showed that GFP protein could be expressed in the organisms wit.pdf
 
Thepossible mechanism by which a 75kD nuclear protein is imported in.pdf
Thepossible mechanism by which a 75kD nuclear protein is imported in.pdfThepossible mechanism by which a 75kD nuclear protein is imported in.pdf
Thepossible mechanism by which a 75kD nuclear protein is imported in.pdf
 
The neurons are nervous cells which play the central role in generat.pdf
The neurons are nervous cells which play the central role in generat.pdfThe neurons are nervous cells which play the central role in generat.pdf
The neurons are nervous cells which play the central role in generat.pdf
 
The parts of the respiratory tract which have nonkeratinized stratif.pdf
The parts of the respiratory tract which have nonkeratinized stratif.pdfThe parts of the respiratory tract which have nonkeratinized stratif.pdf
The parts of the respiratory tract which have nonkeratinized stratif.pdf
 
The impact of Brexit would be visible on the financial instituations.pdf
The impact of Brexit would be visible on the financial instituations.pdfThe impact of Brexit would be visible on the financial instituations.pdf
The impact of Brexit would be visible on the financial instituations.pdf
 
The alkaline earth metals burn in oxygen to form the monoxide, MO wh.pdf
The alkaline earth metals burn in oxygen to form the monoxide, MO wh.pdfThe alkaline earth metals burn in oxygen to form the monoxide, MO wh.pdf
The alkaline earth metals burn in oxygen to form the monoxide, MO wh.pdf
 
Squid molluscCrab ArthropodsCrayfish ArthropodsPolychaete .pdf
Squid molluscCrab ArthropodsCrayfish ArthropodsPolychaete .pdfSquid molluscCrab ArthropodsCrayfish ArthropodsPolychaete .pdf
Squid molluscCrab ArthropodsCrayfish ArthropodsPolychaete .pdf
 
The code you written is little bit confusing and lengthy. Here is th.pdf
The code you written is little bit confusing and lengthy. Here is th.pdfThe code you written is little bit confusing and lengthy. Here is th.pdf
The code you written is little bit confusing and lengthy. Here is th.pdf
 
Ques-1Normala flora and microbiota of nose and mouth are non-infe.pdf
Ques-1Normala flora and microbiota of nose and mouth are non-infe.pdfQues-1Normala flora and microbiota of nose and mouth are non-infe.pdf
Ques-1Normala flora and microbiota of nose and mouth are non-infe.pdf
 
Solution.According to IASB framework INCOME is the one of element .pdf
Solution.According to IASB framework INCOME is the one of element .pdfSolution.According to IASB framework INCOME is the one of element .pdf
Solution.According to IASB framework INCOME is the one of element .pdf
 
7. Answer is A.Cytochromes are protien containing iron or heme gro.pdf
7. Answer is A.Cytochromes are protien containing iron or heme gro.pdf7. Answer is A.Cytochromes are protien containing iron or heme gro.pdf
7. Answer is A.Cytochromes are protien containing iron or heme gro.pdf
 
A and C. RGB analog component video uses no compression, imposes no .pdf
A and C. RGB analog component video uses no compression, imposes no .pdfA and C. RGB analog component video uses no compression, imposes no .pdf
A and C. RGB analog component video uses no compression, imposes no .pdf
 
Public key authentication is the most secure colution and utilizes a.pdf
Public key authentication is the most secure colution and utilizes a.pdfPublic key authentication is the most secure colution and utilizes a.pdf
Public key authentication is the most secure colution and utilizes a.pdf
 

Recently uploaded

Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 

Recently uploaded (20)

Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 

Please follow the data There are some flag and the control charac.pdf

  • 1. Please follow the data : There are some flag and the control characters that are usewd in the fields of communication to maintain a synchronous data from the sender and the receiver. Some of the flags described are the ACK and NAK flags or the control characters. These characters will generally have the standard decimal values that maintain. a) ACK : It is the flag value that assigns to acknowledge indicating the result of the process that has been initiated from the user or the sender. It also describes that the process was successful. It is the abbrevation of Acknowledgement. The decimal value for the ACK flag is given by (6)10. So from the conversion of decimal to binary we get the values of the ACK flag as (0110)2. Now the hexadecimal value can be given as the same as the values for the hexa and the binary would be same till the value of 15 as though they describr the same point. So the hexadecimal value of the ACK flag is (6)16. b) NAK : It is a flag or a boolean value that describes the sender or the user indicating that the data has not been received correctly or the data has been tampered or lost over the network. It is the abbrevation of Negative Acknowledgement. The decimal value that is listed accordingly for the characters is given by (21)10. So the binary format of the NAK flag is givem by (0001 0101)2. Now that converting it to the hexadecimal value we get the NAK flag value as 15(16). Hope this is helpful. Solution Please follow the data : There are some flag and the control characters that are usewd in the fields of communication to maintain a synchronous data from the sender and the receiver. Some of the flags described are the ACK and NAK flags or the control characters. These characters will generally have the standard decimal values that maintain. a) ACK : It is the flag value that assigns to acknowledge indicating the result of the process that has been initiated from the user or the sender. It also describes that the process was successful. It is the abbrevation of Acknowledgement. The decimal value for the ACK flag is given by (6)10. So from the conversion of decimal to binary we get the values of the ACK flag as (0110)2. Now the hexadecimal value can be given as the same as the values for the hexa and the binary
  • 2. would be same till the value of 15 as though they describr the same point. So the hexadecimal value of the ACK flag is (6)16. b) NAK : It is a flag or a boolean value that describes the sender or the user indicating that the data has not been received correctly or the data has been tampered or lost over the network. It is the abbrevation of Negative Acknowledgement. The decimal value that is listed accordingly for the characters is given by (21)10. So the binary format of the NAK flag is givem by (0001 0101)2. Now that converting it to the hexadecimal value we get the NAK flag value as 15(16). Hope this is helpful.