1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Schach [20]
3 years ago
6

Suppose Client A initiates a Telnet session with Server S. At about the same time, Client B also initiates a Telnet session with

Server S. Run telnet in a terminal and capture the traffic on Wireshark. For example, open a telnet session using this command: "telnet cs537.cs.csusm.edu". What are the source and destination port numbers for the following items?
Computers and Technology
1 answer:
poizon [28]3 years ago
5 0

Answer:

An answer to this question is given below in explanation section.

Explanation:

The given question is incomplete. First, we write the complete question that is:

Suppose Client A initiates a Telnet session with Server S. At about the same time, Client B also initiates a Telnet session with Server S. Run telnet in a terminal and capture the traffic on Wireshark. For example, open a telnet session using this command: "telnet cs537.cs.csusm.edu". What are the source and destination port numbers for the following items?

  1. the segment sent from A to S.
  2. the segment sent from B to S.
  3. the segment sent from S to A.
  4. the segment sent from S to B.
  5. if A and B are different hosts, is it possible that the source port number in the segments from A to S is the same as that from B to S?
  6. how about if they are the same host?

Answers

                           Source Port Numbers               Destination Port Number

  1. A -> S                      1467                                               23
  2. B -> S                       1513                                               23
  3. S->A                         23                                                  1467
  4. S->B                         23                                                  1513
  5. Yes, it is that the source port number in the segement from A to S is the same as that from B to S. In short, there is no relationship between port numbers on different hosts
  6. no, a port number identify UNIVOCALLY a process.

You might be interested in
Which tab provide text formatting features
kirill [66]

Answer:

Home tab

Explanation:

Assuming that this question is based on providing text formatting features in Microsoft Word, this feature is found on the Home tab in the Font group or the Font dialog box. Some of these formatting features include underline style, colour, strikethrough, superscript, and subscript.

4 0
4 years ago
g How safe is to have a LinkedIn account where you have published all the important information about yourself
irina [24]

Answer:

LinkedIn is very safe

Explanation:

LinkedIn is very safe, that being said you should never post private information about yourself anywhere that you do not want others to see/know. LinkedIn is a job recruiting and networking site, meaning that all the information that you have or will be publishing there should be related to your career. There is no reason for you to publish private information such as document numbers, social security number, address, bank account info, etc.

5 0
3 years ago
Read 2 more answers
Which tool will be useful in darkening a subject’s hair color in a photograph? A.Dodge tool B.Burn tool C.Patch tool D.Blur tool
choli [55]
It's B. The burn tool darkens stuff. The dodge tool lightens stuff. hope this helps, have an amazing day :)
8 0
4 years ago
Read 2 more answers
5. Suppose that we designed a new floating point unit that accelerates the floating point instructions by a factor of 5. We are
galina1969 [7]

Answer:

3

Explanation:

6 0
4 years ago
Which method is useful for dimensionality reduction especially for small data-sets?
Anna [14]
Independent Component Analysis (ICA) is based on information-theory and is also one of the most widely used dimensionality reduction techniques.
8 0
3 years ago
Other questions:
  • Why are video games interesting?
    5·1 answer
  • Data mining is defined as: a)Separating data and programs such that each can be changed without changing the other b)Allowing ma
    5·1 answer
  • Can someone help me
    8·1 answer
  • To access WordPad, Jill will click on Start, All Programs, Accessories, and WordPad. To access Notepad, Karl will click on Start
    14·1 answer
  • Choose the correct term to complete the sentence.
    10·2 answers
  • Abby wants to simply share a snapshot of her calendar with another user. Which option should she choose to achieve
    15·1 answer
  • A city planner is using simulation software to study crowd flow out of a large arena after an event has ended. The arena is loca
    15·1 answer
  • Im drinking coffee. and working on school and watching a show. Whos with me?
    9·1 answer
  • How can you have internet without subscribing to cable?
    13·1 answer
  • Select the correct answer. Nancy has made a small web page with the new features of HTML5. She has to show this web page in scho
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!