1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kipiarov [429]
1 year ago
5

Imagine an everyday scenario in which you are using the internet: downloading a file, uploading a photo, checking your email, et

c. You may choose the data “type” and overall scenario according to your own preferences. Next, create a slideshow presentation of how that data moves through the seven layers of the Open Systems Interface (OSI), starting with the hardware in the Physical Layer and ending with the software of the Application Layer.
Be sure to mention specifically which of these services and protocols would be used in your scenario:

Data Link Layer: ARP, OSPF, L2TP, PPP
Network Layer: IP, ICMP, IGMP, IPsec
Transport Layer: TCP, TSL/SSL, UDP
Application Layer: DHCP, DNS, FTP, HTTP, SMTP, Telnet, IMAP.

This doesn't need to be a long answer or even cover all of those.
Computers and Technology
1 answer:
ad-work [718]1 year ago
3 0

Imagine an everyday scenario in which you are using the internet: downloading a file, uploading a photo, checking your email, etc then TCP and UDP vacation spot port numbers are dynamically generated with the aid of using the sending tool that allows you to music the responses to requests.

<h3>Which TCP IP software layer protocol is generally used to map IP addresses to the Web pages?</h3>

FTP (File Transfer Protocol) It is one of the extensively used software layer protocols of the TCP/IP protocol suite. FTP is largely used to change facts among host gadgets over the Internet or Intranet securely.

TCP and UDP vacation spot port numbers are dynamically generated with the aid of using the sending tool that allows you to music the responses to requests. TCP mechanisms retransmit facts while an acknowledgment isn't always acquired from the vacation spot device inside a hard and fast duration of time,.

Read more about the L2TP:

brainly.com/question/15327815

#SPJ1

You might be interested in
Why do we install doorbells in our house
Vinil7 [7]

Explanation:

It's placed near the door. When a visitor presses the button, the bell rings inside alerting you that someone is at the door.

6 0
3 years ago
Read 2 more answers
explain the joke, “There are 10 types of people in the world: those who understand binary and those who don’t.”
tino4ka555 [31]

Answer:

Binary is made up of only 2 digits: a one and a zero. 1011 is eleven in our counting system.

So 10 in binary = 2 in our counting system.

Read the joke as follows. There are 2 types of people in the world: those who  understand binary and those who do not.

I guess it's not really that funny, but computer programmers like it.

6 0
11 months ago
If a surface is. it is exactly vertical
Jobisdone [24]
What are the choices
8 0
3 years ago
Do individuals have a privacy interest in their smartphones' locations?
Rzqust [24]

Answer:

In today's world, everyone using smartphones as it easily allow to communicate by using different types of features like texting, video, e-mail and by using internet we can run various types of applications.

Smartphones carries one of the main and important skills that is show our current location. By using various types of applications like Global positioning system (GPS), cell ID and wifi we can easily trace the location.

But there is different types of option according to the individual requirement as some people want privacy as they are not interested to share their location to anyone.

6 0
3 years ago
What are comments meant to do?
docker41 [41]
Comment<span> (computer programming) ... In computer programming, a </span>comment<span> is a programmer-readable explanation or annotation in the source code of a computer program. They are added with the purpose of making the source code easier for humans to understand, and are generally ignored by compilers and interpreters.</span>
8 0
3 years ago
Other questions:
  • Please look at picture
    10·2 answers
  • A paradigm innovation occurs when:
    6·1 answer
  • Mation about which osi layers of connected cisco devices can be verified with the show cdp neighbors comm
    15·1 answer
  • William found out that someone used his report on American culture without his permission. What is William a victim of?
    13·2 answers
  • The question of ________ arises when considering the way in which online marketers gather consumers’ information over the Intern
    6·1 answer
  • In science class, Patricia is giving a presentation on the different types of flowers in her community. As part of her presentat
    5·1 answer
  • Assume you are a manager in the security department of a high-tech corporation. You are mentoring Mary, an entry-level network t
    7·1 answer
  • How was science used to make television?
    6·2 answers
  • Examples of how the development of coding changed the way we live. What type of technology was created as a result of code?
    10·1 answer
  • Data mining requires specialized data analysts to ask ad hoc questions and obtain answers quickly from the system. select one: t
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!