1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vinil7 [7]
3 years ago
5

My home PC has IP address 192.168.1.22 and connects to the Internet through a NAT router. Assume I am downloading a web page fro

m www.amazon. Describe how each IP packet from amazon to my home PC will be modified by the NAT router.
Computers and Technology
1 answer:
alekssr [168]3 years ago
5 0

Answer and Explanation:

There are three sections to the inquiry.  

1. what occurs inside the PC or host when a bundle is produced by an application.  

2.how it goes from one host that is a source to another host that is a goal with numerous switches sitting in the middle.  

3.what goes inside goal have when it gets a parcel on the system.  

how about we examine individually  

Handling bundle at source machine:  

The application creates a bundle to be sent on the system and sends it to the layer beneath.  

The following layer is known as a vehicle layer which oversees start to finish correspondence between two machines. The convention utilized can be TCP or UDP. What is the contrast between these two conventions is another subject by and large.  

When the parcel is framed at the vehicle layer, it is sent to the system layer which includes source and goal IP in the bundle. A most significant field which is included at IP or system layer is Time To Live (TTL) which is utilized by middle switches/changes to choose if a parcel should be sent or not. (How goal IP is found?)  

After the system layer, the parcel arrives at the information connection or MAC layer, where the source and goal MAC address of machines are included. We will perceive how these fields change between each two neighbors. (How goal MAC is found?)  

The information interface layer pushes this bundle to the physical layer where it is sent as a flood of "0" and "1" on the physical medium accessible.  

Preparing a bundle at switch:  

Steering  

There are three cases which may happen when the switch investigates the directing table for goal IP  

1. On the off chance that there is a section relating to goal IP, we get the interface name the parcel ought to be sent to.  

2. On the off chance that there is no immediate passage, at that point IP is changed over into organize IP utilizing the veil and afterward checked once more. It ought to be noticed that the longest prefix match to locate the best sending interface.  

3. In the case of nothing matches, at that point the switch just advances it to the default goal designed.  

Sending  

Epitome  

Preparing parcel at the goal have  

The parcel is gotten at arrange card, physical layer, which produces a hinder to CPU and CPU peruses bundle in,  

At the information connect layer, goal MAC address is verified whether the parcel is bound to this machine, If indeed, the bundle is sent up to the system layer.  

At the IP layer, parcel approval like checksum confirmation, and so on is done and afterward gave to the applicable vehicle layer.  

Transport later at that point gives it to the fitting port with the goal that it arrives at the right application.

You might be interested in
Ebba has received a new initiative for her security team to perform an in-house penetration test. What is the first step that eb
myrzilka [38]

The first step that Ebba should take is: Information gathering and Reconnaissance.

<h3>What is an In-house Penetration Test?</h3>

An in-house Penetration test is a form of offensive test that is aimed at finding the lapses that a system has and initiating attacks to know the best way to prevent them.

Before launching such a test it is advised to plan and gather information about the possible lapses.

This will help the pen tester to know what attacks to launch and the right measures to resolve them. So, the first step that Ebba should take is Information gathering and Reconnaissance.

Learn more about In-house Penetration test here:

brainly.com/question/19085749

3 0
2 years ago
Write a program using integers user_num and x as input, and output user_num divided by x three times.Ex: If the input is:20002Th
HACTEHA [7]

Answer:

Following are the code to the given question:

user_num = int(input())#defining a variable user_num that takes input from user-end

x = int(input())#defining a variable x that takes input from user-end

for j in range(3):#defining for loop that divides the value three times

   user_num = user_num // x#dividing the value and store integer part

   print(user_num)#print value

Output:

2000

2

1000

500

250

Explanation:

In the above-given program code two-variable "user_num and x" is declared that inputs the value from the user-end and define a for loop that uses the "j" variable with the range method.

In the loop, it divides the "user_num" value with the "x" value and holds the integer part in the "user_num" variable, and prints its value.  

5 0
3 years ago
Sort the following everyday examples of sedimentary processes into the bins labeled with the sedimentary processes they most clo
Firlakuza [10]

The Sorting of the  examples of sedimentary processes are:

  • Sediment Erosion/transport - The dirt going down the drain after you give your dog a bath and drain the tub Dirt being blown off a patio
  • Deposition of sediment - Dust collecting on furniture
  • Weathering of rock - Tree roots extending into a rock layer and breaking it down Ice expanding in a crack in the road creating a pothole
  • Compaction/lithification - A dump truck dumps a load of gravel on your lawn. The dirt below it becomes more consolidated

<h3>What is the sedimentary process known as?</h3>

Sedimentary rocks are said to be the outcome of

1) The weathering of preexisting rocks,

2) The transport of the weathering products,

3) The  deposition of the material.

4) The  compaction process.

5) The cementation of the sediment to form a rock.

This is known to be the most vital geological processes that has lead to the making of sedimentary rocks such as due to erosion, weathering, dissolution, and others

Therefore, The Sorting of the  examples of sedimentary processes are:

  • Sediment Erosion/transport - The dirt going down the drain after you give your dog a bath and drain the tub Dirt being blown off a patio
  • Deposition of sediment - Dust collecting on furniture
  • Weathering of rock - Tree roots extending into a rock layer and breaking it down Ice expanding in a crack in the road creating a pothole
  • Compaction/lithification - A dump truck dumps a load of gravel on your lawn. The dirt below it becomes more consolidated

See full question below

Sort the following everyday examples of sedimentary processes into the bins labeled with the sedimentary processes they most closely represent. Drag the appropriate items into their respective bins View Available Hint(s) Reset Heip A dump truck dumps a load of gravel on your lawn. The dirt below it becomes more consolidated Dirt being blown off a patio Ice expanding in a crack in the road Dust collecting on furniture creating a pothole Tree roots extending into a rock layer you give your dog The dirt going down the drain after a bath and drain the tub and breaking it down Sediment Erosion/transport Deposition of sediment Weathering of rock Compaction/lithification

Learn more about sedimentary processes from

brainly.com/question/13291293

#SPJ1

4 0
2 years ago
Anyone wanna play Bloons tower defense 5 im rank 52
diamong [38]

Answer:

nah im good fam thanks for askin

Explanation:

8 0
3 years ago
Read 2 more answers
The decision-maker's attitude toward riskcan change the outcome of a situation involving risk.
Brrunno [24]

Answer: True

Explanation: Yes, there is a major impact of the decision maker's attitude on a risky situation. In risky situation if the decision maker is on side of taking non-risking decision then there would be less chances of severe outcome but if the decision maker tends to take risk then the situation can have any sort of impact good or bad as outcome. Therefore there is a huge impact of decision makers attitude.

8 0
3 years ago
Other questions:
  • The dashed lines that display on your slide when you are moving an object are
    10·1 answer
  • File formats are linked to certain programs.<br><br> True<br> False
    12·2 answers
  • ________ is an encryption standard used for secure transactions such as credit card processing and online banking. TLS DMZ White
    14·1 answer
  • Billy used to take care of his laptop. However, one day he lost his laptop. He lost all his data, and there was no way to retrie
    11·1 answer
  • PLEASE HELP!!!!! WILL MARK BEST ANSWER BRAINLIEST!!!~~~
    11·2 answers
  • Henry has created a software product that manages a database of company clients. He wants to install the software on a client's
    13·1 answer
  • 1. Fill in the blanks with appropriate word. 5°1-5 is a collection of raw unprocessed facts, figures, and symbols ​
    12·1 answer
  • Did you know a security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer sy
    11·2 answers
  • ____must cooperate with each other to neutralize the global threat of information censorship. Select 3 options.
    12·1 answer
  • true or false, the random number generator (data analysis tool) requires you to copy paste special value in order to create stat
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!