Nate Tripp ITS 210.01 Chapter 5 Text Review Questions  Fill in the waste 1. Firewall 2. interlocking and Sharing C disgrace 3. Router 4. Open Systems Interconnection (OSI) audience model 5. Connectionless protocol 6. Ping.exe 7. Nslookup.exe 8. Dynamic clear System (DNS) 9. Tracert.exe 10. physical and cover True/False 1. F 2. T 3. T 4. T 5. F 6. T 7. F 8. F 9. T 10. F Review Questions 1. The Hardware aim is burned into the NIC by the manufacturer where the IPv4 bestowress is either entered statically or assigned by DNS. 2. The application throws the message blue to the origination forge to be on the watch for the session layer which keeps atomic number 82 of the sessions of data transfer. It wherefore passes it down to the transembrasure layer which designates which port/application range out accept it at the destination by adding to the capitulum .
it is whence passed down to the network protocol which will add more to the header by designating the network address of the destination. it is then passed down by the data ling and physical layer which are then passed to the network medium which will sweep up it to its succeeding(a) hop. This happens spikeletwards when the packet arrives at the destination. it is decapsulated as it goes back through the identical processes backwards. Case Scenarios 1. They should open a vane browser and enter the URL: HTTP://10.54.3.145:283 2. The IP addresses on each computer would acquire to be unique hardly under the same frame/network. Also the subnet mas! k would cause to be identical on each computer and contain to its network class.If you want to get a full essay, rewrite it on our website: OrderCustomPaper.com
If you want to get a full essay, visit our page: write my paper
No comments:
Post a Comment