school

thing1's amazing school repo
Log | Files | Refs | Submodules | README

question (1797B)


      1 5.1) It avoids the worry of running out of IP addresses on the local
      2 network (1)
      3 
      4 5.2) Because the external ip address of the computer will be the
      5 same for the entire network, meaning each lan only takes up 1 IP address 
      6 (2)
      7 
      8 5.3) By blocking websites that may contain malware on a blacklist basis.
      9 By blocking all comunications through specific ports that could be holding
     10 dangerous info.  By inspecting all incoming data and blocking it if it
     11 is dangerous.  By redirecting some sites to other ones, avoiding tracking
     12 sites.  
     13 (3)
     14 
     15 5.4) A subnet mask will be used to check if the 2 computers are
     16 connected to eachother via the same router, or if they can comunicate
     17 via a chain of local routers.  The packets will be set over a network by
     18 first sending them down the link (physcal) connection, to the router,
     19 they will have been processed to work with the ip protocol, and tcp or
     20 udp, and a applications specific formating.  The packet will be sent to
     21 the routher which will check if the device that is going to recive the
     22 data is on the same network, if it is, it will send it straight to it,
     23 otherwise it will be sent over the internet.  Packet switching will be
     24 used to ensure that the data is sent quickly. The packet will be broken
     25 into many peices and sent accorss many different wires accross the world.
     26 When the data is recived on the otherside it will be put back together in
     27 the right order.  The data will have been sent with a checksum, this can
     28 be checked by the recipient.  It will contain some form of information,
     29 in a known format (like the number of 1's in the data) and check if
     30 that value matches what was recived in the packet.  If it is not, then
     31 the data was currupted, and the recipient will ask for it to be resent.
     32 When it is sent properly the process ends. 
     33 (8)
     34 
     35 2)a)