Answered step by step
Verified Expert Solution
Question
1 Approved Answer
A user is using three applications telnet to log in to a remote computer. User ID is 'mr' and Password 'su'. The user is chatting
A user is using three applications telnet to log in to a remote computer. User ID is 'mr' and Password 'su'. The user is chatting with her friend using WhatsApp and sent a message "done". The user is also downloading a file using torrent that contains the word 'link' Telnet and torrent data are using an encryption algorithm where the characters will be replaced by another character based on the table posted bellow whereas the WhatsApp data is encrypted using caesar cipher where the characters are shifted 2 places to the left. Both Telnet and torrent data are using the encoding scheme given in the encoding table posted bellow whereas the Whatsapp is using the ascii table for encoding. We can send only 4 bit telnet data at a time and 8 bit Torrent and Whatsapp data at a time. The port number for telnet is 23 , whatsApp is 5222 , and torrent is 6969 Show the procedure where the data will be encapsulated in each layer. Encoding Table ('e', ':', '0') ('t', ':', '1') ('a', ',',' '10') ('o', ':', '11') ('n', ':', '100') ('r', ':', '101') ('i', ':',' '110') ('s', ':', '1111') (h ', ':', '1000') ('d', ':', '1001') ('I', ' ':', '1010') ('f', ' ':', '1011') ( 'c', ':', '1100') (u,:,1110 ') Fill in the following blanks: 1. Encoding is done by .... Layer 2. ... layer ensure that data to or from forwards to the appropriate application based on the application port. 3. In order to secure the data ... layer performs encryption 4. ... layer provides user facilitate user to communicate by providing an application-specific interface. 5. Your data might be very large. Therefore,... layer break your large data into smaller chunk. A user is using three applications telnet to log in to a remote computer. User ID is 'mr' and Password 'su'. The user is chatting with her friend using WhatsApp and sent a message "done". The user is also downloading a file using torrent that contains the word 'link' Telnet and torrent data are using an encryption algorithm where the characters will be replaced by another character based on the table posted bellow whereas the WhatsApp data is encrypted using caesar cipher where the characters are shifted 2 places to the left. Both Telnet and torrent data are using the encoding scheme given in the encoding table posted bellow whereas the Whatsapp is using the ascii table for encoding. We can send only 4 bit telnet data at a time and 8 bit Torrent and Whatsapp data at a time. The port number for telnet is 23 , whatsApp is 5222 , and torrent is 6969 Show the procedure where the data will be encapsulated in each layer. Encoding Table ('e', ':', '0') ('t', ':', '1') ('a', ',',' '10') ('o', ':', '11') ('n', ':', '100') ('r', ':', '101') ('i', ':',' '110') ('s', ':', '1111') (h ', ':', '1000') ('d', ':', '1001') ('I', ' ':', '1010') ('f', ' ':', '1011') ( 'c', ':', '1100') (u,:,1110 ') Fill in the following blanks: 1. Encoding is done by .... Layer 2. ... layer ensure that data to or from forwards to the appropriate application based on the application port. 3. In order to secure the data ... layer performs encryption 4. ... layer provides user facilitate user to communicate by providing an application-specific interface. 5. Your data might be very large. Therefore,... layer break your large data into smaller chunk
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started