Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

A user is using three applications telnet to log in to a remote computer. User ID is 'mr' and Password 'su'. The user is chatting

image text in transcribedimage text in transcribedimage text in transcribed

A user is using three applications telnet to log in to a remote computer. User ID is 'mr' and Password 'su'. The user is chatting with her friend using WhatsApp and sent a message "done". The user is also downloading a file using torrent that contains the word 'link' Telnet and torrent data are using an encryption algorithm where the characters will be replaced by another character based on the table posted bellow whereas the WhatsApp data is encrypted using caesar cipher where the characters are shifted 2 places to the left. Both Telnet and torrent data are using the encoding scheme given in the encoding table posted bellow whereas the Whatsapp is using the ascii table for encoding. We can send only 4 bit telnet data at a time and 8 bit Torrent and Whatsapp data at a time. The port number for telnet is 23 , whatsApp is 5222 , and torrent is 6969 Show the procedure where the data will be encapsulated in each layer. Encoding Table ('e', ':', '0') ('t', ':', '1') ('a', ',',' '10') ('o', ':', '11') ('n', ':', '100') ('r', ':', '101') ('i', ':',' '110') ('s', ':', '1111') (h ', ':', '1000') ('d', ':', '1001') ('I', ' ':', '1010') ('f', ' ':', '1011') ( 'c', ':', '1100') (u,:,1110 ') Fill in the following blanks: 1. Encoding is done by .... Layer 2. ... layer ensure that data to or from forwards to the appropriate application based on the application port. 3. In order to secure the data ... layer performs encryption 4. ... layer provides user facilitate user to communicate by providing an application-specific interface. 5. Your data might be very large. Therefore,... layer break your large data into smaller chunk. A user is using three applications telnet to log in to a remote computer. User ID is 'mr' and Password 'su'. The user is chatting with her friend using WhatsApp and sent a message "done". The user is also downloading a file using torrent that contains the word 'link' Telnet and torrent data are using an encryption algorithm where the characters will be replaced by another character based on the table posted bellow whereas the WhatsApp data is encrypted using caesar cipher where the characters are shifted 2 places to the left. Both Telnet and torrent data are using the encoding scheme given in the encoding table posted bellow whereas the Whatsapp is using the ascii table for encoding. We can send only 4 bit telnet data at a time and 8 bit Torrent and Whatsapp data at a time. The port number for telnet is 23 , whatsApp is 5222 , and torrent is 6969 Show the procedure where the data will be encapsulated in each layer. Encoding Table ('e', ':', '0') ('t', ':', '1') ('a', ',',' '10') ('o', ':', '11') ('n', ':', '100') ('r', ':', '101') ('i', ':',' '110') ('s', ':', '1111') (h ', ':', '1000') ('d', ':', '1001') ('I', ' ':', '1010') ('f', ' ':', '1011') ( 'c', ':', '1100') (u,:,1110 ') Fill in the following blanks: 1. Encoding is done by .... Layer 2. ... layer ensure that data to or from forwards to the appropriate application based on the application port. 3. In order to secure the data ... layer performs encryption 4. ... layer provides user facilitate user to communicate by providing an application-specific interface. 5. Your data might be very large. Therefore,... layer break your large data into smaller chunk

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Refactoring Databases Evolutionary Database Design

Authors: Scott Ambler, Pramod Sadalage

1st Edition

0321774515, 978-0321774514

More Books

Students also viewed these Databases questions