1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Schach [20]
3 years ago
6

Suppose Client A initiates a Telnet session with Server S. At about the same time, Client B also initiates a Telnet session with

Server S. Run telnet in a terminal and capture the traffic on Wireshark. For example, open a telnet session using this command: "telnet cs537.cs.csusm.edu". What are the source and destination port numbers for the following items?
Computers and Technology
1 answer:
poizon [28]3 years ago
5 0

Answer:

An answer to this question is given below in explanation section.

Explanation:

The given question is incomplete. First, we write the complete question that is:

Suppose Client A initiates a Telnet session with Server S. At about the same time, Client B also initiates a Telnet session with Server S. Run telnet in a terminal and capture the traffic on Wireshark. For example, open a telnet session using this command: "telnet cs537.cs.csusm.edu". What are the source and destination port numbers for the following items?

  1. the segment sent from A to S.
  2. the segment sent from B to S.
  3. the segment sent from S to A.
  4. the segment sent from S to B.
  5. if A and B are different hosts, is it possible that the source port number in the segments from A to S is the same as that from B to S?
  6. how about if they are the same host?

Answers

                           Source Port Numbers               Destination Port Number

  1. A -> S                      1467                                               23
  2. B -> S                       1513                                               23
  3. S->A                         23                                                  1467
  4. S->B                         23                                                  1513
  5. Yes, it is that the source port number in the segement from A to S is the same as that from B to S. In short, there is no relationship between port numbers on different hosts
  6. no, a port number identify UNIVOCALLY a process.

You might be interested in
How many bytes make up a megabyte? One hundred One thousand One million One billion
Phoenix [80]
One million is the answer.
4 0
3 years ago
Please help! ;(
Art [367]
Okay u have to use my teqnieq and search it up because i said so and it wil get u the right answer
8 0
3 years ago
Read 2 more answers
How to transfer audio files from computer to android?
fenix001 [56]
U can use Bluetooth connect your computer to the android. <span />
5 0
3 years ago
This career applies mathematical and theoretical knowledge in order to compare and produce computational solutions.
ipn [44]

Answer:

Why does love.com redirect to Verizon.

Explanation:

4 0
3 years ago
Read 2 more answers
The ________ is a keyboard form based on the principle of voices imitating each other.
Brut [27]

A fugue is a keyboard form founded on the principles of voices imitating each other.

What is a fugue?

In theme, a fugue is a contrapuntal compositional process in two or more voices, built on a topic (a musical theme) that is presented at the beginning in imitation (repetition at other pitches) and which recurs often in the course of the design. It is not to be misunderstood with a figuring tune, which is a style of a song popularized by and mostly limited to early American music and West Gallery music. A fugue usually has three main areas: an exposition, a story, and a final admission that includes the return of the issue in the fugue's remedy key. Some fugues have a recapitulation.

To learn more about fugue, refer to:

brainly.com/question/1132239

#SPJ4

The complete question is:

The ________ is a keyboard form based on the principle of voices imitating each other.

a. fugue

b. prelude

c. suite

d. toccata

7 0
1 year ago
Other questions:
  • How can you tell if a hacker has administrative access?
    15·2 answers
  • Impact of computer on education
    6·2 answers
  • In general, use no more than _____ font types in a worksheet.
    11·1 answer
  • Why were mechanical calculators developed?
    8·2 answers
  • The color band that represents tolerance on a resistor is the?
    11·1 answer
  • If you see an advertisement for a 3TB portable drive, this is most likely a reference to the device having a capacity of three
    10·1 answer
  • Two friends can share 100 songs from their Bluetooth enabled mobile devices
    13·1 answer
  • Я люблю есть гнезда петух
    11·1 answer
  • Write a program with a "function" named "getMinFromInput()" that reads a list of integers from the keyboard and returns the smal
    5·1 answer
  • One way to check if a website is secure is to look for a/an<br> in the address bar.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!