1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
-BARSIC- [3]
3 years ago
10

Johnny just set up a TCP connection with a web server in Chicago, Illinois, claiming he is coming in with a source IP address th

at clearly belongs to a network in Copenhagen, Denmark. In exam- ining the session logs, you notice that he was able to complete the three-way handshake for this connection in 10 milliseconds. How can you use this information to prove Johnny is lying?
Computers and Technology
1 answer:
wariber [46]3 years ago
7 0

Answer:

Assuming that the distance from Chicago Illinois to Copenhagen Denmark is 4200 miles and the speed of light is 186,400 miles per second;

The time difference 10 milliseconds in the session log and the calculated time of 22.5 milliseconds.

Explanation:

The TCP three way handshake connection time is determined by the distance between the connecting hosts and the speed of the link.

If the distance between the hosts is 4200 miles and the link speed is an assumed speed of light 186,400 miles per second, the TCP session time is;

Time = distance/ speed

Time = 4200 / 186400

Time = 0.0225 seconds. = 22.5 milliseconds

But Johnny's TCP session time is 10 milliseconds, therefore Johnny is lying about the source IP address from Copenhagen Denmark.

You might be interested in
Evidence that Social media hasn’t improved human communication.
LUCKY_DIMON [66]

Answer:

language and interpersonal communication, basically it would make someone antisocial.

5 0
3 years ago
A(n _______________ is a pre-written formula that is built into excel
nevsk [136]
<span>A function is a pre-written formula that is built into excel.
There are many functions which are pre-written into excel.
Some examples are the SUM function which adds the values in a given range. The AVERAGE function takes the average of values in a given range, etc.
</span>
8 0
3 years ago
Windows, Apple’s Mac OS, and Unix/Linux are just some of the most common what?
34kurt
Most common PC operating systems
7 0
4 years ago
Read 2 more answers
Describe how implementation of a raid level 2 system would be beneficial to a university payroll system
lisabon 2012 [21]

<span>The RAID level 2 could give high information exchange rates and would be straightforward contrasted with other Raid levels. Be that as it may, it has a high cost and would need a high rate move required with a specific end goal to legitimize this cost.</span>

4 0
4 years ago
: Write a function "def countWords(string)" that returns a count of all words in an input string represented by the variable 'st
Zina [86]
We can define a word as a group of characters without a space between them. To find the words of the input string , w can use split(delimiter) which returns a list of strings which had the defined delimiter between them in the input string.

def countWords(string):
words = string.split(" ")
count = len(words)
return count

Here we set the delimiter as the space character, and returned the length of the words list. I split each step into its own line for readability, however the function could be one line:

return len(string.split())

Here, no delimiter is specified. If one isn't given, it will default to split at any whitespace, including space.

3 0
3 years ago
Other questions:
  • Most graphics software uses a process called pixel _________ to create new pixels by averaging the colors of nearby pixels.â
    6·1 answer
  • which virtue you need to secure information by limiting computer access to authorized personnel only?
    10·1 answer
  • In Alphatech Systems, email software screens incoming messages by organizing them into mailboxes and identifying junk mail. As a
    13·1 answer
  • The best place to start when you are looking for information about a device or an application is the ____ of the company that ma
    14·1 answer
  • What is the name of the newer communication protocol that is supported by Window 10's version of TCP/IP?
    11·1 answer
  • What malware looks like a useful or desired executable program but is, in reality, a program that is supposed to cause harm to y
    11·1 answer
  • MEOWWWWWRARRARARARARRA
    5·1 answer
  • 9. Which of the following is the<br>leading use of computer?​
    13·1 answer
  • Which of the following is not the disadvantage of closed
    7·2 answers
  • I have no idea how to use the sep and end in Python can someone help me I have a test tomorrow
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!