1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kipiarov [429]
2 years ago
5

Imagine an everyday scenario in which you are using the internet: downloading a file, uploading a photo, checking your email, et

c. You may choose the data “type” and overall scenario according to your own preferences. Next, create a slideshow presentation of how that data moves through the seven layers of the Open Systems Interface (OSI), starting with the hardware in the Physical Layer and ending with the software of the Application Layer.
Be sure to mention specifically which of these services and protocols would be used in your scenario:

Data Link Layer: ARP, OSPF, L2TP, PPP
Network Layer: IP, ICMP, IGMP, IPsec
Transport Layer: TCP, TSL/SSL, UDP
Application Layer: DHCP, DNS, FTP, HTTP, SMTP, Telnet, IMAP.

This doesn't need to be a long answer or even cover all of those.
Computers and Technology
1 answer:
ad-work [718]2 years ago
3 0

Imagine an everyday scenario in which you are using the internet: downloading a file, uploading a photo, checking your email, etc then TCP and UDP vacation spot port numbers are dynamically generated with the aid of using the sending tool that allows you to music the responses to requests.

<h3>Which TCP IP software layer protocol is generally used to map IP addresses to the Web pages?</h3>

FTP (File Transfer Protocol) It is one of the extensively used software layer protocols of the TCP/IP protocol suite. FTP is largely used to change facts among host gadgets over the Internet or Intranet securely.

TCP and UDP vacation spot port numbers are dynamically generated with the aid of using the sending tool that allows you to music the responses to requests. TCP mechanisms retransmit facts while an acknowledgment isn't always acquired from the vacation spot device inside a hard and fast duration of time,.

Read more about the L2TP:

brainly.com/question/15327815

#SPJ1

You might be interested in
What is Identity Theft?
olga55 [171]
A is correct! We did this in Law!

Have a merry Christmas!
5 0
3 years ago
One of the following is NOT a type of Intellectual Property
zmey [24]

Group of answer choices.

a) Copyright

b) Trademark

c) Trade Secrets

d) Privacy​

Answer:

d) Privacy​

Explanation:

An intellectual property can be defined as an intangible and innovative creation of the mind that solely depends on human intellect.

Simply stated, an intellectual property is an intangible creation of the human mind, ideas, thoughts or intelligence. They include intellectual and artistic creations such as name, symbol, literary work, songs, graphic design, computer codes, inventions, etc.

Generally, there are different types of intellectual property (IP) and this includes;

a) Copyright

b) Trademark

c) Trade Secrets

However, privacy is a type of intellectual property.

5 0
3 years ago
What is an IF statement used for?
kiruha [24]

The IF statement is a decision-making statement that guides a program to make decisions based on specified criteria. The IF statement executes one set of code if a specified condition is met (TRUE) or another set of code evaluates to FALSE.

8 0
3 years ago
(10 points) A stopwatch has three states named Zero, Running, and Stopped. There are two buttons, named B1 and B2. For each butt
solniwko [45]

Answer:

see explaination

Explanation:

State Diagram based on given in the problem and state table, k-map for j and k, based j and k expressions we can draw the (FSM )controller using j and j flip flop.

see attachment for this.

6 0
3 years ago
What can I do with this? Lol
nikitadnepr [17]
Do with what? If you have a question please contact me ;)
3 0
3 years ago
Other questions:
  • An enterprise DBMS is automatically capable of serving as a mobile DBMS. There are no special issues raised by mobility. True Fa
    11·1 answer
  • Which of these protects against the most common attacks on the internet via a database of signatures, but at the same time actua
    9·1 answer
  • What is media consumption ?
    12·2 answers
  • Ophelia is entering a Get Fit! sporting goods store in a shopping mall when her heel gets caught in a heating grate at the thres
    9·1 answer
  • ICD-10-CM diagnosis codes are entered in Block 21 of the CMS-1500 claim. A maximum of __________ ICD-10- CM codes may be entered
    14·1 answer
  • Which of these personal protective equipment items prevents injury from falling objects ?
    15·1 answer
  • Which of these tax forms reports an employee's yearly social security tax withheld
    11·2 answers
  • Please help explain this calculator code.
    15·1 answer
  • Computer father known as​
    5·1 answer
  • Describe the cutting-edge program that is referred to as agile
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!