New Semester
Started
Get
50% OFF
Study Help!
--h --m --s
Claim Now
Question Answers
Textbooks
Find textbooks, questions and answers
Oops, something went wrong!
Change your search query and then try again
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Tutors
Online Tutors
Find a Tutor
Hire a Tutor
Become a Tutor
AI Tutor
AI Study Planner
NEW
Sell Books
Search
Search
Sign In
Register
study help
computer science
business data networks
Business Data Networks and Security 11th Edition Raymond R. Panko, Julia L. Panko - Solutions
a. What layer or layers govern(s) transmission media?6a.) Which layer governs wires?b. Application programs?6b1.) Which standards layer governs e-mail?6b2.) Which standards layer governs the World Wide Web?6b3.) Which standards layer governs peer-to-peer file sharing?6b4.) Which standards layer
Do the following without using a calculator or computer, but check your answers with a calculator or a computer. a. Convert 6 to binary.b. Convert 47 to binary.c. Convert 100 to binary.d. Convert 110100 to decimal. e. Convert 001100 to decimal.
a. What are the standards agencies for OSI? Just give the abbreviations5a.) A standards agency for OSI is ____________.a. ITU-Tb. IETFc. Both A and Bd. Neither A nor Bb. Distinguish between ISO and OSI.5b.) Which of the following is an architecture?a. ISOb. IETFc. Both A and Bd. Neither A nor Bc.
a. In Figure 2-16, what will be the value in the destination port number field if a packet arrives for the e-mail application? (Yes, this is a repeat question.)b. When the HTTP program on a webserver sends an HTTP response message to a client PC, in what field of what message will it place the
a. Why do standards architectures have multiple layers?b. To what does a standards layer provide services?4b.) Standards layers provide services directly to ______.a. The next-higher layerb. The next-lower layerc. All layersd. Only themselvesc. If you change a standard at one layer, do standards at
Compute the minimum number of TCP segments required to open a connection, send an HTTP request and response message, and close the connection if the HTTP response message must be fragmented across ten packets. Justify this number by creating a table showing each message and its sequence
a. What standards agency creates Internet standards?3a.) Which standards agency(ies) create(s) Internet standards?a. OSIb. TCP/ IPc. ISO and ITU-Td. IETFb. What other two standards agencies work together to create network standards?3b.) Which of the following is a standards agency?a. OSIb. TCP/
a. Distinguish between standards and protocols.2a.) Standards mean the same thing as _______.a. Semanticsb. Syntaxc. Rulesd. Protocolsb. What is a network standard?c. What is interoperability?2c.) Network standards provide _______.a. Strobingb. Synchronizationc. Interoperabilityd. Entanglementd.
a. Compute the minimum number of TCP segments required to open a connection, send an HTTP request and response message, and close the connection. Justify this number by creating a table showing each message and its sequence number. b. Repeat the question, this time if the HTTP response message
a. What are IETF standards called? (Spell out the name and give the acronym.)1a.) Internet standards are published as _______.a. RFCsb. IETFsc. TCP/ IPsd. Internet Protocolsb. W hat factors in the Internet’s informal development process lead to rapid standards development and low-cost
How do you think TCP would handle the problem if an acknowledgment were lost, so that the sender retransmitted the unacknowledged TCP segment, therefore causing the receiving transport process to receive the same segment twice?
a. Compare Internet core routers with home access routers in terms of functionality.27a1.) ________ have access points.a. Home access routersb. Internet core routersc. Both A and Bd. Neither A nor B27a2.) ________ have DHCP servers.a. Home access routersb. Internet core routersc. Both A and Bd.
a. Are all data link addresses EUI-48 addresses?26a.) All data link addresses are EUI-48 addresses.a. Trueb. Falseb. In which header are source and destination IP addresses found?26b.) Source and destination IP addresses found in the ______ header.a. IPb. Framec. TCPd. All of the abovec. In which
a. Are packets carried inside frames, or are frames carried inside packets?25a.) Which of the following is true?A. Frames are carried inside packets.B. Packets are carried inside framesC. Both a and bD. Neither a nor bb. A host sends a packet to another host. There are ten single networks along the
a. In Figure 1-22, how many physical links will there be when Router A sends a Packet to Router B. b. How many data links will there be? c. When Client Host Y sends a packet to Router B, how many physical links will there be?d. Data links?e. When Client Host Y sends a packet to Server
a. Distinguish between physical links and data links.23a.) In a single switched network, a _______ connects consecutive switches.a. Physical linkb. Data linkc. Routed. None of the aboveb. In a point-to-point single network, how many physical links will there be when a packet is transmitted?23b.) In
a. Distinguish between the originating host, the DNS server, and the target host.b. What is the purpose of a DNS lookup?22b.) When Host A wishes to communicate with Host B, a DNS server provides the IP address of _______.a. Host Ab. the DNS serverc. Host Bd. None of the above22b.) When Host A
a. What type of host gets a dynamic IP address?21a.) On the Internet, a ________ host usually gets a dynamic IP address.a. Clientb. Serverc. Both A and Bd. Neither A nor Bb. What type of host gets a static I P address?21b.) On the Internet, a ________ host usually gets a static IP address.a.
a. Why does the Internet need supervisory protocols?b. Which of the following is an Internet supervisory protocol?a. DNSb. IPc. Both A and Bd. Neither A nor B
a. There are six routers between the source and destination host. How many transport processes will be involved? Explain.19a.) There are 10 routers between the source and destination hosts. How many transport processes will be involved on all devices?a. 1b. 2c. 10d. 12b. How many internet processes
a. Distinguish between data links and routes.18a.) paths across a single network are called ________.a. Routesb. Data linksc. Physical linksd. None of the aboveb. In Figure 1-15, how many data links are there when the packet travels to Host 5.6.7.8?c. How many routes will there be?d. In general,
a. What does a router do when an IP packet arrives?17a.) Routing is based on a(n) _________.a. IP addressb. Single-network addressc. Either A or Bd. Neither A nor Bb. What is router forwarding called?17b.) Router forwarding is called _________.a. Routingb. Switchingc. Forwardingd. None of the
a. What are the three parts of an IP packet? 16a.) Which is NOT in an IP packet?a. Internet headerb. Transport headerc. Data link headerd. All of the above ARE part of the IP packetb. In which part will you find the source and destination IP addresses?c. Which of these addresses will routers
a. How many bits long are IPv4 addresses?15a.) IPv4 addresses are ______ bits long.a. 32b. 64c. 128d. None of the above15a.) _____ addresses are 32 bits long.a. IPv4b. IPv6c. EUI-48d. None of the aboveb. Convert 00000001 00000010 00000000 11111111 to dotted decimal notation (spaces have been
a) What does the internet process on the destination host do when a packet arrives for it?14a.) When a frame arrives, the data link process on the destination host .a) Adds a headerb) Removes a headerc) Both a and bd) Neither a nor bb) What does the transport process on the destination host do with
a. What are the three parts of an I P packet?b. An IP packet may include a(n) _____.a. application message or fragmentb. TCP segment or UDP datagramc. Both A and Bd. Neither A nor B
a. What two processes does the network stack provide?12a.) The network stack implements the ________ layer process(es).a. Applicationb. Transportc. Physicald. Data linkb. What is the maximum size of an IP packetc. What does the transport process do to the application message if it is short enough
a. What are networked applications?b. Is the client always a browser?11b.) The client program is nearly always a browser.a. Trueb. Falsec. Is the server always a webserver?11c.) The server program is always a webserver program.a. Trueb. False
a. Distinguish between client and server hosts.10a.) When you use your tablet to access the Internet, the tablet is a ________.a. Client hostb. Server hostc. Both A and Bd. Neither A nor Bb. What type of devices are most servers?10b.) Most servers are ________.a. Mainframesb. Windows PCsc. Rack
a. Why is the Internet often depicted as a cloud?9a.) Depicting the Internet as a cloud symbolizes that ________.a. The Internet is amorphousb. The Internet today is too complex to be understandable by humansc. The Internet is too complex for anyone to depictd. Users do not have to know how the
a. What does “Inter” in Internet mean.8a.) In the name Internet, “inter” means _______.a. Betweenb. Interiorc. Internationald. Interplanetaryb. Why is this significant?
a. Why is the Internet’s ability to give broad access a good thing?b. What danger does it bring?7b.) From the point of view of security, the Internet’s ability to give access to nearly everyone is a _______.a. Good thingb. Bad thingc. Both A and Bd. Neither A nor B
Repeat for Router 1 and Router 2.In Figure 1-28, when Host A transmits a packet to Host B, how many physical links, data links, and routes will there be along the way? How many packets and frames? How many switches and routers?
a. Who owns the Internet?6a. Who owns the Internet?a. The U.S. governmentb. The United Nationsc. The IETFd. No oneb. Who is in charge of the Internet?6b.) Who is in charge of the Internet?a. The U.S. governmentb. The United Nationsc. The IETFd. No onec. What is the role of the IETF?6c.) The IETF
Repeat for Router 1 and Router 3.In Figure 1-28, when Host A transmits a packet to Host B, how many physical links, data links, and routes will there be along the way? How many packets and frames? How many switches and routers?
a. What continuing changes in the Internet are contributing to its ability to support new applications constantly?5a.) Which of the following is leading to new applications constantly?a. Increasing speedb. Increasing reliabilityc. Increasing availability wherever you ared. All of the aboveb. What
Repeat for Host E and Router 3.In Figure 1-28, when Host A transmits a packet to Host B, how many physical links, data links, and routes will there be along the way? How many packets and frames? How many switches and routers?
a. What do we call any device connected to the Internet?4a.) We call any device connected to the Internet a(n) ______.a. IPb. Clientc. Routerd. Hostb. When you use a laptop to connect to the Internet, is it a host? Explain in terms of the definition of host.4b.) Which of the following is a host
Repeat for Host A to Host C.In Figure 1-28, when Host A transmits a packet to Host B, how many physical links, data links, and routes will there be along the way? How many packets and frames? How many switches and routers?
a. What services do Internet service providers provide?3a.) ISPs _____.a. Carry traffic in the Internetb. Connect users to the Internetc. Both A and Bd. Neither A nor Bb. In Figure 1-2, through which ISP(s) will traffic pass if a packet from Hawaii.edu goes to Panko.com? c. Through which
Repeat for Host C sending a packet to Host E.In Figure 1-28, when Host A transmits a packet to Host B, how many physical links, data links, and routes will there be along the way? How many packets and frames? How many switches and routers?
When was commercial activity on the Internet first allowed?
In Figure 1-28, when Host A transmits a packet to Host B, how many physical links, data links, and routes will there be along the way? How many packets and frames? How many switches and routers?
a. What is a D DoS attack?1a.) Flooding a host with traffic so that it cannot serve its legitimate users is a ______ attack.a. Hackingb. Virusc. Malwared. DoSb. In what two ways was the KrebsOnSecurity.com D DoS attack unusual?1b.) The KrebsOnSecurity.com attack ______.a. Was a denial of service
Showing 300 - 400
of 344
1
2
3
4
Step by Step Answers