1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kipiarov [429]
1 year ago
5

Imagine an everyday scenario in which you are using the internet: downloading a file, uploading a photo, checking your email, et

c. You may choose the data “type” and overall scenario according to your own preferences. Next, create a slideshow presentation of how that data moves through the seven layers of the Open Systems Interface (OSI), starting with the hardware in the Physical Layer and ending with the software of the Application Layer.
Be sure to mention specifically which of these services and protocols would be used in your scenario:

Data Link Layer: ARP, OSPF, L2TP, PPP
Network Layer: IP, ICMP, IGMP, IPsec
Transport Layer: TCP, TSL/SSL, UDP
Application Layer: DHCP, DNS, FTP, HTTP, SMTP, Telnet, IMAP.

This doesn't need to be a long answer or even cover all of those.
Computers and Technology
1 answer:
ad-work [718]1 year ago
3 0

Imagine an everyday scenario in which you are using the internet: downloading a file, uploading a photo, checking your email, etc then TCP and UDP vacation spot port numbers are dynamically generated with the aid of using the sending tool that allows you to music the responses to requests.

<h3>Which TCP IP software layer protocol is generally used to map IP addresses to the Web pages?</h3>

FTP (File Transfer Protocol) It is one of the extensively used software layer protocols of the TCP/IP protocol suite. FTP is largely used to change facts among host gadgets over the Internet or Intranet securely.

TCP and UDP vacation spot port numbers are dynamically generated with the aid of using the sending tool that allows you to music the responses to requests. TCP mechanisms retransmit facts while an acknowledgment isn't always acquired from the vacation spot device inside a hard and fast duration of time,.

Read more about the L2TP:

brainly.com/question/15327815

#SPJ1

You might be interested in
A graph of an organization'snet income over the past 10 years is an example of an analogmodel.
oksano4ka [1.4K]

Answer:

True

Explanation:

<u>Analog model</u>

It is a representation of target model,it include charts,models of electric and mechanical system and graphs also.The size of this model is not fixed it may vary according to the requirements,so it may be small or big.

As per question,the graph is representing net income of an organization, it also representing a model(target) for the company that's why we can call it an Analog model.

6 0
3 years ago
The following algorithm computes the average height for a list of basketball player heights. Initialize a variable sum to 0. For
prisoha [69]

Answer:

Sequencing and Iteration

Explanation:

Sequencing is a part of all programs, as it's just the fact that computers execute programs in a particular sequence (like top to bottom line in a simple program).

Iteration on the other hand is when we use loops to repeat code in a program.

6 0
3 years ago
Read 2 more answers
An excel user should use a relative cell reference when it is important to ____. preserve the relationship to the formula locati
adell [148]

An excel user should use a relative cell reference when it is important to preserve the relationship to the formula location. When you create a formula that references other cells, excel does not normally "record" the exact cell address. Instead, it looks at the at the relationship that cell has to the other cell containing the formula.

7 0
3 years ago
In a block of addresses we know the IP address of one host is Roll no. Roll no. Roll no. Roll no./20.What is the first address a
lesya [120]

Answer:

If there’s one topic that trips people up (both new and experienced) in the networking industry, it is that of Subnetting.

One of the reasons this happens is that one has to perform (mental) calculations in decimal and also binary. Another reason is that many people have not had enough practice with subnetting.

In this article, we will discuss what Subnetting is, why it came about, its usefulness, and how to do subnetting the proper way. To make this article as practical as possible, we will go through many examples.

Note: While subnetting applies to both IPv4 and IPv6, this article will only focus on IPv4. The same concepts explained here can be applied to IPv6. Moreover, subnetting in IPv6 is more of a want rather than a necessity because of the large address space.

IP address network

For example, any traffic with a destination IP address of 192.168.1.101 will be delivered to PC1, while traffic addressed to 192.168.1.250 will be delivered to SERVER.

Note: This is an oversimplification of things just for understanding sake and refers to Unicast (one-to-one) IPv4 addresses. Traffic sent to Multicast (one-to-many) and Broadcast (one-to-all) IP addresses can be delivered to multiple devices. Also, features like Network Address Translation (NAT) allow one IP address to be shared by multiple devices.

To help your understanding of IP addresses and subnetting, you need to resolve the following fact in your head: Computers think in binary, that is, 0s and 1s. Therefore, even though we see an IP address represented like 192.168.1.250, it is actually just a string of bits – 32 bits in total for IPv4 addresses.

To make them more readable for humans, IPv4 addresses are represented in dotted decimal notation where the 32 bits are divided into 4 blocks of 8 bits (also known as an octet), and each block is converted to a decimal number.

For example, 01110100 in binary is 116 in decimal:

A unicast IPv4 address such as 192.168.1.250 can be divided into two parts: Network portion and Host ID. So what does this mean? Well, IPv4 addresses were originally designed based on classes: Class A to Class E. Multicast addresses are assigned from the Class D range while Class E is reserved for experimental use, leaving us with Class A to C:

Class A: Uses the first 8 bits for the Network portion leaving 24 bits for host IDs. The leftmost bit is set to “0”.

Class B: Uses the first 16 bits for the Network portion leaving 16 bits for host IDs. The two leftmost bits are set to “10”.

Class C: Uses the first 24 bits for the Network portion leaving 8 bits for host IDs. The three leftmost bits are set to “110”.

Note: The range of Class A is actually 1-126 because 0.x.x.x and 127.x.x.x are reserved.

With these classes, a computer/device can look at the first three bits of any IP address and determine what class it belongs to. For example, the 192.168.1.250 IP address clearly falls into the Class C range.

Looking at the Host ID portion of the classes, we can determine how many hosts (or number of individual IP addresses) a network in each class will support. For example, a Class C network will ideally support up to 256 host IDs i.e. from 00000000 (decimal 0) to 11111111 (decimal 255). However, two of these addresses cannot be assigned to hosts because the first (all 0s) represents the network address while the last (all 1s) represents the broadcast address. This leaves us with 254 host IDs. A simple formula to calculate the number of hosts supported

Explanation: Final answer is Start address: 192.168.58.0 + 1 = 192.168.58.1

End address: 192.168.58.16 – 2 = 192.168.58.14

Broadcast address: 192.168.58.16 – 1 = 192.168.58.15

7 0
2 years ago
What do you like most about brainly?
Natali5045456 [20]

Getting the answers to my homework :p

4 0
3 years ago
Read 2 more answers
Other questions:
  • If you want to boot from a hard drive what must it have
    6·1 answer
  • List 3 ways that you can use excel and the features it includes and explain why a spreadsheet is the best choice for this task.
    5·1 answer
  • What are the advantages of homogenation
    5·1 answer
  • Write a Console Java program that asks the user to enter one sentence on the keyboard. Output on the console:
    6·1 answer
  • What type of information is kept on a database?
    10·1 answer
  • List at least three benefits of automated testing?
    13·1 answer
  • Why does my hp computer keep freezing when i move it?
    10·1 answer
  • How we can get NET I'D by IP Address?
    11·1 answer
  • What are the two ways that assets are
    5·1 answer
  • I’ll mark brainliest, thanks
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!