Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

In the internet protocol suite, lost packets are re-sent. Which part of the protocol suite is responsible for sending lost or damaged packets: ICMP IP

image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
In the internet protocol suite, lost packets are re-sent. Which part of the protocol suite is responsible for sending lost or damaged packets: ICMP IP TCP UDP SMTP How does a computer know what its own IP address is? It uses a pop-up box to ask the user what IP address to use. It uses the correct method from the networking library to learn the IP address from the operating system. It reads a configuration file which contains the address to use. It uses a network broadcast to learn its address from a server. There are a wide variety of mechanisms to assign an IP address to a computer, depending on whether static or dynamic address is used. When the Avian protocol (RFC1149, RFC2549 and RFC6214) was discussed, it was suggested that it was a good example of implementing IP over a wide variety of mediums. How would the situation where a pigeon carrying a data packet gets shot and eaten be handled, thereby not delivering the data to the destination. The datagram from the pigeon, which is on paper, could be put in the post and sent onward to the destination for final delivery. The sending pigeon loft will note the non-arrival of a return pigeon and will send a replacement pigeon. The receiving pigeon loft will note the late arrival of the pigeon and phone the sender and ask for a replacement. Sending internet data by pigeons is just silly and there is no sensible answer The computer at the sending end will be running a timer in TCP and know that the ACK packet is late and resend the data without knowing anything about pigeons FTP and telnet are disabled by default on a windows machine for security reasons. What is the vulnerability of these applications? They are very old applications and their code contains many bugs, so they are disabled to prevent hacking. They were originally developed on unix systems and are incompatible with a modern windows system. They do not use encryption and so passwords are transmitted across the network in plain text making them vulnerable to capture. They enable an invisible back door into the windows administrator account. They are too complex for normal windows users, who would require special training to use them properly. An application that uses TCP can be made faster by switching to UDP and doing the retransmission in the application using IP directly and doing the retransmission in the application making the application coding more efficient doing nothing. No speed improvements can be made using thicker network cables to connect the computer to the network

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Larry Ellison Database Genius Of Oracle

Authors: Craig Peters

1st Edition

0766019748, 978-0766019744

More Books

Students also viewed these Databases questions

Question

What attracts you about this role?

Answered: 1 week ago

Question

How many states in India?

Answered: 1 week ago

Question

HOW IS MARKETING CHANGING WITH ARTIFITIAL INTELIGENCE

Answered: 1 week ago