Please Note:
As per the Chegg Answering Guidelines, I should answer the first
question.
Below I have answered the first 2 questions.
Please Re-post for the other Questions
Answer)
27) question not clear and complete or cropped
28)question not clear and complete or cropped
29) Which IP addresses generally appear in an IPV4 datagram
header, source(S), intermediate(I), destination (D)?
source(S) and destination (D)
Answer)
c) S,D
30) How many synchronization(SYN) requests are sent as part of establishing a 3 way handshake?
SYN performs a three-way (or 3-step) handshake
Answer)
c) 3
Subject. Internet & web design technology I need the questions number. 27, 28, 29,30,35,,37,39 , 40,43,45,49,50...
3) [10 marks] Refer to following Figure 2.14 and Figure 16.3. This question is about encapsulation, decapsulation, and protocols. Figure 2.14 illustrates that a TFTP Trivial File Transfer Protocol) packet is encapsulated in a UDP (User Datagram Protocol) segment that in turn is encapsulated in an IP (Internet Protocol) datagram. In Figure 2.14, the length of each row is 32 bits (4 bytes). For example, the length of row "Source Address" is 32 bits long. Figure 16.3 gives the format...
Question 1 The size of the datagram is determined by the application that sends the data. Allowing the size of datagrams to vary makes IP adaptable to a variety of applications. True False Question 2 What is the conceptual network boundary, and where is it located within the protocol stack? Is the transition area between digital and analog signals and can be found between layer 2 and layer 3 of the protocol stack. Identifies application direct messaging and is formed...
Networks Hi guys. I need some assistance with a few questions below. 1. Which of the following is TRUE regarding a TCP 3-way handshake. a. Consists of 3 segments being sent between 2 hosts b. Segments only carry data in the SYN, ACK and sequence number bits and bytes with no data c. No ACK is needed for the SYNACK received from the receiver d. A, B and C e. None of the above 2. Which...
RSA is a common form of symmetric key encryption. Select one: True False What is the purpose of a nonce in an end-point authentication protocol? Select one: a. It protects against replay attacks. b. It serves as a private key. c. It serves as a public key. d. It serves as a signature. e. It serves as a shared symmetric key. What is (19 * 16) mod 7? Answer: A TCP connection setup requires 3 messages to be passed. How...
Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic redundancy check (CRC) A. Yes, No, No B. No, Yes, Yes c. No, Yes, No D. No, No, Yes E. Ho, hum, ha Q2 CRC vs Internet checksums Which of these is not true? A. CRC's are commonly used at the link layer B. CRC's can detect any bit error of up to r bits with an r-bit EDC. c. CRC's are more resilient to bursty...
just need help with part c key and public key cryptography methods 2. (a) Explain the difference between the symmetric (b) In the famou s RSA algorithm for public key cryptography, very large prime numbers are used so as to make ult for the attackers to find from their product the prime factors. However, for an illustration of the ideas behind the RSA algorithm, you could chooses two small prime numbers 7 and 11, and a public key e 13...
EXPLAIN in details why is it true or false. need to be 100% POSTIVE OF ANSWER. SOLVE D E F G H I J 2) (10 points) IP and MAC addressing. True or False. Circle True or False. One point for each correct answer, zero points for each incorrect answer. Many of the questions refer the folowing network consisting of three 10Mbps Ethernet segments, one switch, and one router. Assume all ΛΕΡ tables are up-to-date unless otherwise stated Switch Ronter...
Write code for RSA encryption package rsa; import java.util.ArrayList; import java.util.Random; import java.util.Scanner; public class RSA { private BigInteger phi; private BigInteger e; private BigInteger d; private BigInteger num; public static void main(String[] args) { Scanner keyboard = new Scanner(System.in); System.out.println("Enter the message you would like to encode, using any ASCII characters: "); String input = keyboard.nextLine(); int[] ASCIIvalues = new int[input.length()]; for (int i = 0; i < input.length(); i++) { ASCIIvalues[i] = input.charAt(i); } String ASCIInumbers...
1. Which of the following protocols is used by a client to send an email message? a. HTTP SMTP b. FTP d. RDP 2. What is the most common network topology today? a/Star c. Hub Ring d. Mesh 3. A client/server network is the simplest network model. a/ True O False 4. Which client server application allows an administrator to control a remote computer, but does not encrypt or secure the communication between client and server? A Telnet C. Remote...
QUESTION 2 Ensuring that data is genuine, meaning that the sender of the data is who they say they are, that the data received is the data that the sender meant to send, and that the receiver is who they say they are a. confidentiality b. authentication c. non-repudiation d. integrity 2 points QUESTION 3 Cryptography method that uses a single key for both encryption and decryption a. prime factorization b. asymmetric c. symmetric d. message authentication code 2...