Question

You want to transfer a document from one computer to another, and you want the document...

You want to transfer a document from one computer to another, and you want the document to be encrypted. The destination computer is on another network, so you know data has to travel through one or more routers. The network technology on your network is Ethernet, but the technology on the destination network is Wi-Fi. From what you have learned about networking, should this document transfer work? Why or why not? Which layers of the OSI model are involved in the italicized parts of this description?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Yes, the transfer should work.
The routers know the route between networks, and a WAP will handle the conversion from ethernet to wireless. The encryption takes place higher up in the stack and is not involved with getting the data from point a to point b.

The italicized parts did not come through, however...
WAP operates at Layer 1
Routers operate at Layer 3
Encryption takes place at a higher level, but it's been too long since I studied this to remember the exact Layer, but I think its Layer 6.

Add a comment
Know the answer?
Add Answer to:
You want to transfer a document from one computer to another, and you want the document...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • OSI model

    ou want to transfer a document from one computer to another, and you want the document to be encrypted. The destination computer is on another network, so you know data has to travel through one or more routers. The network technology on your network is Ethernet, but the technology on the destination network is Wi-Fi.Should this document transfer work? Why or why not? Which layers of the OSI model are involved in the italicized parts of this description?

  • You are working at home and want to access to your office file server to download...

    You are working at home and want to access to your office file server to download a file, and you want the connection to be secure and encrypted. Your office is in another network, so you know that your request has to travel through one or more routers. The network technology on your network is Ethernet but the technology on the destination network is Wi-Fi. From what you have learned about networking, ·        What protocol is suitable for this connection? [2...

  • 1. Open a new Microsoft Word document, and enter your answer to one of the prompts...

    1. Open a new Microsoft Word document, and enter your answer to one of the prompts below: a. Select two articles from the RSS feed, one that details a recent attack and one that explains a new stronger security technology or procedure. Summarize each article and include a concluding paragraph that explains how you as a security professional would use this information. b. Scan the articles that appeared over the last two weeks. Use those articles to create your own...

  • HOMEWORK 4

    Each (1-13) question is 5 points: 1.      How many bits are in a MAC address?2.       3.      How many bits are in an IPv4 IP address? 4.      When using DSL modem to connect to the Internet, the data transmission shares the cabling with what other technology? 5.      Which type of networking cable is more reliable, STP or UTP? Which is used more on LANs? 6.      Which TCP/IP protocol that manages packet delivery guarantees that delivery? Which protocol does not guarantee delivery, but is faster? 7.      Which...

  • Suppose you are using a 100Mbps transmission line to transfer large amounts of data to multiple...

    Suppose you are using a 100Mbps transmission line to transfer large amounts of data to multiple remote destinations. Your cousin who rides an Uber approaches you and claims that he has a side business of carrying large amounts of data! He owns 1000 flash drives with 32GB of capacity each, and as soon as you put your data on those flash drives, he will deliver them to any destination with an average speed of 36 km/h. 1.At what range of...

  • Part E - Use phasors to subtract one sinusoid from another sinusoid Suppose you want to...

    Part E - Use phasors to subtract one sinusoid from another sinusoid Suppose you want to find the difference of two sinusoidal currents, given as follows: ¿1(t) = 1; cos(wt+$1) and iz(t) = 12 cos(wt+$2). If you stay in the time domain, you will have to use trigonometric identities to perform the subtraction. But if you transform to the frequency domain, you can simply subtract the phasors I1 and 12 as complex numbers using y calculator. Make sure that all...

  • help with computer network questions 1. What is the difference between circuit switching and packet switching?...

    help with computer network questions 1. What is the difference between circuit switching and packet switching? 2. What are the different layers in today’s Internet? Why do we create layers? 3. Suppose there is a 10 Mbps microwave link between a geostationary satellite and its base station on Earth. Every minute the satellite takes a digital photo and sends it to the base station. Assume a propagation speed of 2.4 * 10^8 meters/sec. a. What is the propagation delay of...

  • 166 Chapter 8: TCP/IP Applications Getting Down to Business The way network communication all those ls...

    166 Chapter 8: TCP/IP Applications Getting Down to Business The way network communication all those ls and Os) goes in and out of a machine physically is through the NIC (network interface card). The way network communication goes in and out of a machine logically though, is through a program or service. A service is a program that runs in the background, independent of a logon, that provides functionalities to a system. Windows client machines, for instance, have a Workstation...

  • Pleapples were first added and one final picture at over 12 Luely hour for 6 hours hours (you wil...

    answer a-e please pleapples were first added and one final picture at over 12 Luely hour for 6 hours hours (you will end up with 8 pictures in total). Keep the same orientation and position every time you take a picture. (It is recommended you take the picture at a slight angle to show some depth perception) Post Experiment Tasks 1) Organize the 8 photos in chronological order 2) Answer the following questions based on your understanding of Topics 5...

  • Before leaving Alpha Centauri, you change from the shuttle to a light speed interstellar cruiser and head out deep into the galaxy to visit another binary star system - but this one is composed...

    Before leaving Alpha Centauri, you change from the shuttle to a light speed interstellar cruiser and head out deep into the galaxy to visit another binary star system - but this one is composed of dead stars! To occupy your waking travel time by reading about this star system in the "Outer Space Tourbook": Stars spend most of their lifetimes undergoing nuclear fusion in their cores, which is why they give off so much light. However, when the material necessary...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT