Similarities between each osi layer and the secret letter

Assignment Help Computer Networking
Reference no: EM131004368

Assignment

You live in Omaha, and you are a secret agent. You need to send a three page letter to another secret agent in Blair. You decide to send each page separately because of the highly secret nature of the message. And, you decide to encrypt the message. You send the three pages as registered mail, which requires receipts from the recipient.

Describe any similarities between each OSI layer and the secret letter being sent to your fellow agent. A hint for several of the layers: Think about the address on an envelope. What part(s) are similar to the idea of a data frame? What parts are similar to the idea of an IP address?

Application:

 

Presentation:

 

Session:

Don't worry about this layer. Models aren't perfect, and this layer doesn't work well for our secret agent example.

Transport:

 

Network:

 

Data Link:

 

Physical:

 

Reference no: EM131004368

Questions Cloud

Solutions to quiz 2 : Solutions to Quiz 2 are after the questions. Consider two bonds, A and B. Both bonds presently are selling at their par value of $1,000. Each pay interest of $120 annually. Bond A will mature in 5 years while bond B will mature in 6 years. If the yie..
Evaluate the plans at a marr : The TechEdge Corporation offers two forms of 4-year service contracts on its closed-loop water purification system used in the manufacture of semiconductor packages for microwave and high-speed digital devices. The Professional Plan has an initial..
Employer to implement a program to protect workers : liquids can present serious hazards similar to those posed by gases.
How do international practitioners practice law : How do international practitioners practice law? How do U.S. lawyers locate and engage/hire competent foreign counsel? What type of practice do you engage in
Similarities between each osi layer and the secret letter : Describe any similarities between each OSI layer and the secret letter being sent to your fellow agent. A hint for several of the layers: Think about the address on an envelope. What part(s) are similar to the idea of a data frame? What parts are ..
Determine the monthly cost and present worth value : This is a total of one gallon per day for the two of them. Using this 1 gallon (or 3.78 liters equivalent) basis for three possible sources of drinking water, determine the monthly cost and present worth value for one year of use. For each source,..
How much water flows out of the faucet : Where t is the number of minutes since the faucet was turned on. To the nearest gallon, how much water flows out of the faucet during the first two minutes the faucet is turned on?
Describe bowlbys ethological theory : Describe Bowlbys ethological theory of attachment and trace the development of attachment during the first two years. Be sure to give specific examples.
Find the equation of the tangent line : Find the equation of the tangent line at (√π /12, π /12). Use your explicit equation for y in terms of x to estimate point on the graph and find the value of dy/dx evaluated at this point.

Reviews

Write a Review

Computer Networking Questions & Answers

  Evaluate benefits realized by consumers

Evaluate benefits realized by consumers because of the ability to gain access to their own data via mobile applications. Examine the challenges of developing applications that run on mobile devices because of the small screen size

  Reliable deal with supplier and client reluctance

How might reliable deal with supplier and client reluctance to provide detailed information about their internal operation?

  Question 1 a member of a project team that is implementing

question 1 a member of a project team that is implementing a new credit card payment process at a bank has direct

  Developments in adsl broadband technologies

Show practical and theoretical knowledge of LAN/Internet technologies

  A large environmental organization

A large environmental organization that provides services suchs as water quality monitoring and geological surveys to businesses and government agencies across the nation, needs help designing its corporate WAN

  Advantages and disadvantages of deploying a wlan

discussing the advantages and disadvantages of deploying a WLAN in an organization. Compare the benefits and risks of three security methods, then identify and justify the best approach for securing a WLAN

  What is the implication of the switch-over to

when will the switch-over from ipv4 to ipv6 happen? what is the implication of the switch-over to companies? nbspassume

  Contrast the basic network topologies bus and ring

Contrast the 3 basic network topologies (Bus, Ring, and Star)

  Wireless network coverage and other issues

In this assignment, you will compare and contrast wireless network coverage and other issues involved in the selection of a wireless provider and a mobile ad hoc networks (MANET).

  Define vulnerabilities are patched on hosts on a network

Is there any reason why a network administrator should ensure that known vulnerabilities are patched on hosts on a network that has no connection to any external network

  Depict topology in the diagram

Depict topology in the diagram, Determine if this is a peer-to-peer or client-server network. Be sure to explain what assumption drove you to select it.

  Finding machines is client and which is server

Which of machines A-E is the client and which is the server? In an X-windows environment, a program is running on machine A, displays windows on machine B and a window manager on machine C controls the look and feel of the windows.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd