Question

Protocols (8 points) Aliens have tampered with your computer! They garbled some of the software responsible for your internet communica tions. You know that only one of the layers of the protocol stack has been affected. Which layer would you suspect in each of the following scenarios? a. You can view the source of HTML pages, but they dont display properly. b. You cannot seem to connect to any other computer at all. c. You can ping a computer across the country, but when you try to transfer a whole file it gets scrambled up. d. You can only connect to the hosts that are on your local area network, and no others.
0 0
Add a comment Improve this question Transcribed image text
Answer #1

a.) Presentation Layer

The reason is that the presentation layer is responsible for displaying or presenting the data in one format to the another in a particular period.

b.) Session Layer

The reason is that the session layer is known for setting up the co-ordinates and terminating connections. IT handles all of the protocols like TCP,UDP,etc. which will be responsible for providing services to most of the applications.

c.) Transport Layer

The reason is that the transport layer is known for managing the packetization of the data and then the delivery of the packets, which will include the checking for the errors in the data as it arrives.It works with many services like TCP,UDP,etc.

d.) Data Link Layer

The reason is that this layer is known for linking across the physical networks which will help in putting the packets into the network frames. The layer will consists of the Logical Link Layer & Media Access Control Layer. Hence, it will handle all the connections with LAN.

Rate an upvote....Thankyou

Hope this helps.....

Add a comment
Know the answer?
Add Answer to:
Protocols (8 points) Aliens have tampered with your computer! They garbled some of the software responsible...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 1.DNS can not work if the hostnames are not hierarchal? Explain? 2. Give two scenarios where...

    1.DNS can not work if the hostnames are not hierarchal? Explain? 2. Give two scenarios where DNS protocols (from two hosts) gets two different IP address for the same hostname. 3. If you have a 100% reliable network layer, should you use TCP or UDP at the Transport layer? Explain your answer? 4.Is it is possible for an application on top of UDP to have a reliable data transfer? Explain? 5.Suppose that a Web server runs in Host C on...

  • Six Which of the following options can be used to configure TCP/IP? (Choose all that apply.)...

    Six Which of the following options can be used to configure TCP/IP? (Choose all that apply.) APIPA DHCP DNS Static IP addressing You need to install a new Windows 10 machine into Site A with a subnet mask of 255.255.255.224. Which TCP/IP address can you assign to the new Windows 10 machine as a valid host address? 192.168.2.63 Which subnet mask would you utilize if you had a class C network and you wanted to connect 23 branch offices back...

  • You need not run Python programs on a computer in solving the following problems. Place your...

    You need not run Python programs on a computer in solving the following problems. Place your answers into separate "text" files using the names indicated on each problem. Please create your text files using the same text editor that you use for your .py files. Answer submitted in another file format such as .doc, .pages, .rtf, or.pdf will lose least one point per problem! [1] 3 points Use file math.txt What is the precise output from the following code? bar...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • check my answers for Networking I came up with these answers, can check my answers Question...

    check my answers for Networking I came up with these answers, can check my answers Question 1: General What data rate is needed to transmit an uncompressed 4" x 6" photograph every second with a resolution of 1200 dots per inch and 24 bits per dot (pixel)? 691,200 kb/s 28.8 kb/s 8.29 Mb/s 829 Mb/s Question 2: Layering "Layering" is commonly used in computer networks because (check all that apply): -It forces all network software to be written in ‘C’....

  • And there was a buy-sell arrangement which laid out the conditions under which either shareholder could...

    And there was a buy-sell arrangement which laid out the conditions under which either shareholder could buy out the other. Paul knew that this offer would strengthen his financial picture…but did he really want a partner?It was going to be a long night. read the case study above and answer this question what would you do if you were Paul with regards to financing, and why? ntroductloh Paul McTaggart sat at his desk. Behind him, the computer screen flickered with...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT