Similarities between each osi layer and the secret letter

Assignment Help Computer Networking
Reference no: EM131004368

Assignment

You live in Omaha, and you are a secret agent. You need to send a three page letter to another secret agent in Blair. You decide to send each page separately because of the highly secret nature of the message. And, you decide to encrypt the message. You send the three pages as registered mail, which requires receipts from the recipient.

Describe any similarities between each OSI layer and the secret letter being sent to your fellow agent. A hint for several of the layers: Think about the address on an envelope. What part(s) are similar to the idea of a data frame? What parts are similar to the idea of an IP address?

Application:

 

Presentation:

 

Session:

Don't worry about this layer. Models aren't perfect, and this layer doesn't work well for our secret agent example.

Transport:

 

Network:

 

Data Link:

 

Physical:

 

Reference no: EM131004368

Questions Cloud

Solutions to quiz 2 : Solutions to Quiz 2 are after the questions. Consider two bonds, A and B. Both bonds presently are selling at their par value of $1,000. Each pay interest of $120 annually. Bond A will mature in 5 years while bond B will mature in 6 years. If the yie..
Evaluate the plans at a marr : The TechEdge Corporation offers two forms of 4-year service contracts on its closed-loop water purification system used in the manufacture of semiconductor packages for microwave and high-speed digital devices. The Professional Plan has an initial..
Employer to implement a program to protect workers : liquids can present serious hazards similar to those posed by gases.
How do international practitioners practice law : How do international practitioners practice law? How do U.S. lawyers locate and engage/hire competent foreign counsel? What type of practice do you engage in
Similarities between each osi layer and the secret letter : Describe any similarities between each OSI layer and the secret letter being sent to your fellow agent. A hint for several of the layers: Think about the address on an envelope. What part(s) are similar to the idea of a data frame? What parts are ..
Determine the monthly cost and present worth value : This is a total of one gallon per day for the two of them. Using this 1 gallon (or 3.78 liters equivalent) basis for three possible sources of drinking water, determine the monthly cost and present worth value for one year of use. For each source,..
How much water flows out of the faucet : Where t is the number of minutes since the faucet was turned on. To the nearest gallon, how much water flows out of the faucet during the first two minutes the faucet is turned on?
Describe bowlbys ethological theory : Describe Bowlbys ethological theory of attachment and trace the development of attachment during the first two years. Be sure to give specific examples.
Find the equation of the tangent line : Find the equation of the tangent line at (√π /12, π /12). Use your explicit equation for y in terms of x to estimate point on the graph and find the value of dy/dx evaluated at this point.

Reviews

Write a Review

Computer Networking Questions & Answers

  Benefits to having different types of computers on a network

Do you think there are any benefits to having different types of computers on a network? Why or why not? Please explain

  Hypothetical condition for each signal type used in wan

Give the hypothetical condition for each signal type which shows how it could be, or is being, used in the WAN. In what situations, for instance, would the company select to use satellite signal?

  Benefits of networking within an integrated system

What are the benefits of networking within an integrated system? What are the challenges of networking within an integrated system

  Networking project for computer with all network components

Can I get a sample networking project for 20 computer with all network components?

  Cyber crime research

Conduct an Internet search of cyber crimes. Find a cyber crime, a crime where a computer is used to commit a majority of the crime that has occurred in the last three months. Write a 1 ½ to 2 page synopsis of the crime, using APA style formatting.

  1 thermostats are subjected to rigorous testing before they

1. thermostats are subjected to rigorous testing before they are shipped to air conditioning technicians around the

  Network model

Network Model

  Network infrastructure vulnerabilities

Identify possible network infrastructure vulnerabilities. Address network vulnerabilities with the appropriate security measures. Ensure that consideration is given to virtualization and cloud technology.

  Why is it important to explore traffic behavior

Why is it important to explore traffic behavior when designing a network? What problems could arise if you do not understand traffic behavior when you build a new network or upgrade a network

  Define the s-t cut on node capacitated network

How would one define the s-t cut on node capacitated network as opposed to the edge capacitated network, and how would one illustrate that analogue.

  Draw dependency diagram to show the functional dependencies

Draw a dependency diagram to show the functional dependencies in the relation and decompose GRADE REPORT into a set of 3NF relations

  Find the largest number of nodes

Find the largest number of nodes that can be activated in the end by selecting only one node into the seed set

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd