Premium Essay


In: Computers and Technology

Submitted By blik
Words 347
Pages 2
LAB 3.2

Using Figure 3-1 define each layer of the OSI model in your own words and state what layer provides. Use your textbook or internet to support your answer.
Physical – Device Data Link – Physical address Network – Path determination Transport – End to end connections Session – internet Presentation – typing data Application – games, downloads
Using Figure 3-2 as a basis, complete the diagram to show the intermediate encapsulation provided by each layer.
Application Presentation Session | Data |
Transport | Segment |
Network | Packet |
Data Link | Frame |
Physical | Bit |

Briefly explain the deencapsulation steps in the communication from host B receiving a message from host A destined for an active application.
First the receiving computer synchronizes with the digital signal by reading binary numbers. After synchronizing is complete and it gets the whole frame and passes it to the layer above it which is the Data Link layer. Second the Data Link layer will do a Cyclic Redundancy Check (CRC) on the frame. Checking for errors and then strip off any information or header which was put on by the remote systems Data Link layer and pass the rest to the Network layer. Third the Network layer checks the IP address and if it matches the Network layer header is stripped off from the packet and passed to the Transport layer. Fourth the Transport layer processes the segment and rebuilds the data stream and acknowledges to the transmitting computer that it received each piece. Then sends the data stream to the upper layer Application.

Explain why routing devices do not need the upper layers of the OSI model to route traffic. What is the highest layer of the OSI model used by the router to decide where to forward traffic?
Because routers work primarily at…...

Similar Documents

Premium Essay


...56 Lab #3 | Configure BitLocker and Windows Encryption LAB #3 – ASSESSMENT WORKSHEET Configure BitLocker and Windows Encryption Course Name and Number: IS3340 Windows Security Student Name: Daniel Longo Instructor Name: Dakrouni Lab Due Date: 10/4/2013 Overview In this lab, you used the Microsoft® Encrypting File System (EFS) to encrypt files and folders on a Windows Server 2008 machine. You documented the success or failure of your encryption efforts. You also installed Microsoft® BitLocker Drive Encryption, a data protection feature that is used to resist data theft and the risk of exposure from lost, stolen, or decommissioned computers. You encrypted a data drive on the server and created a recovery key. Lab Assessment Questions & Answers 1. Within a Microsoft® Windows 2008 server R2 environment, who has access rights to the EFS features and functions in the server? 2. What are some best practices you can implement when encrypting BitLocker drives and the use of BitLocker recovery passwords? 38542_Lab03_Pass2.indd 56 3/2/13 10:01 AM Assessment Worksheet 3. What was the recover key created by BitLocker in this lab? 57 4. BitLocker secured drives. How would you grant additional users access rights to your EFS encrypted folders and data files? 5. What are the main differences between EFS and BitLocker? 6. The customer privacy data policy in your company’s data classification standard requires encryption......

Words: 279 - Pages: 2

Free Essay

218 Report

...else { *(digit1+numdigists1-1) = ((*(digit1+numdigists1-1)-‘0’)+1)%10; *(digit1+numdigists1)= *(digit1+numdigists1)+1; } Addition: For(int i=0; i<= length ;i++) If(*bigInteger1[i]+ *bigInteger2[i]<10) *result[i]= *bigInteger1[i]+ *bigInteger2[i]; else *result[i]= (*bigInteger1[i]+ *bigInteger2[i])%10; *result[i+1]=*result[i+1]+1; Subtraction: For(int i=0; i<= length ;i++) If(*bigInteger1[i]- *bigInteger2[i]>=0) *result[i]= *bigInteger1[i]- *bigInteger2[i]; else *result[i]= (*bigInteger1[i]+10- *bigInteger2[i]); *result[i+1]=*result[i+1]-1; Multiplication: for(int a=digInteger1; a>0; a--) *result=addition(multiplier); 2. Flowchart 3. Compiling Instruction # include "Lab3.h" # include <cstdlib> # include <cmath> char *add; char *sub; //char *mult; //char *div; int num1,num2,d1,d2; BigInteger::BigInteger() { digit1=NULL; numdigits1=0; digit2=NULL; numdigits2=0; } BigInteger::~BigInteger() { if(digit1!=NULL&&digit2!=NULL) { delete []digit1; delete []digit2; } else if(digit1!=NULL) { delete []digit1; } else delete []digit2; } int BigInteger::addDigit1(string a) { string l; int num1=0; do { if(digit1==NULL) { numdigits1++; l=a.substr(num1,1); digit1=new char[numdigits1]; strcpy(digit1,l.c_str()); num1++; } else { char *temp = new......

Words: 2137 - Pages: 9

Free Essay

My Paper on Things and Stuff

...Workstation Admins – adds the Server Admins, Domain Admins, and Faculty security groups to the Administrators group on all machines in the Workstations OU (can adjust depending on who client would like to have admin access) Internet Explorer Settings – Applies IE managed settings to all machines in the Workstations OU. Currently empty, can discuss what options should be managed. WorkstationDisplay – locks desktop background and screen saver, enables screen saver, sets screensaver timeout to 10 and requires password on resume. Applied to all devices in Workstations OU Lab1Printers, Lab2Printers, Lab3Printers – Automatically maps the printers in the corresponding lab, setting printer 1 as the primary. Applies to devices in Lab1, Lab2, and Lab3 OU, respectively. (currently points to printers using following naming structure: \\PrintSrv01\Lab1Printer1 \\PrintSrv01\Lab3Printer2 , can fix path to reflect actual names) Enabled group policy loopback on all User Configurations to be applied to OUs based on user account. Additional GPOs can be added after discussing with client....

Words: 409 - Pages: 2

Premium Essay

Gang Street

...REFERENCES 1) 2) 3) 4) INTRODUCTION Basic Laws of Light Absorption. For a uniform absorbing medium (solution: solvent and solute molecules that absorb light) the proportion of light radiation passing through it is called the transmittance, T, and the proportion of light absorbed by molecules in the medium is absorbance, Abs. Transmittance is defined as: T = I/Io where: Io= intensity of the incident radiation entering the medium. I = intensity of the transmitted radiation leaving the medium. T is usually expressed as percent transmittance, %T: %T = I/Io x 100 The relationship between percent transmittance (%T) and absorbance (A) is given by the following equation: A = 2-log (%T) On most spectrophotometers two scales are present, %T and Abs. Absorbance has no units (Why?) and varies from 0 to 2 (linear region for most substances is from 0.05 to 0.7). The Beer-Lambert Law states that Abs is proportional to the concentration (c) of the absorbing molecules, the length of light-path through the medium and the molar extinction coefficient: A = εcl where: ε = molar extinction coefficient for the absorbing material at wavelength in units of 1/(mol x cm) c =......

Words: 376 - Pages: 2

Premium Essay

Does Beauty Have a Cost? the Ecological Footprint of the Cosmetics Industry

...manufacturing companies are not required to register their establishments with the FDA54. They are not required to disclose data on ingredients or to report cosmetic-related injuries. Instead, they are simply encouraged to register their establishments and file Cosmetic Product Ingredient Statements with the agency’s Voluntary Cosmetics Registration Program55. The FD&C Act prohibits cosmetic products which are adulterated or misbranded from being introduced into interstate commerce. Therefore, organizations at every step of the manufacturing process of cosmetics—manufactures, packers, distributors, and retailers—are responsible for 53 FDA (U.S. Food and Drug Administration). “Cosmetics Labeling Guide.” Online. Accessed April 7, 2008 54 Ibid. 55 FDA (U.S. Food and Drug Administration). “FDA Authority Over Cosmetics.” Online. Accessed Oct. 21, 2007. 56 ensuring that the products they are handling do not deserve classification as “adulterated” or “misbranded” even if the cause occurred somewhere previously along the supply chain56. The FDA does not have the authority to mandate pre-market approval for any of these products. Therefore, the safety assessment falls into the hands of cosmetic firms themselves and the cosmetics trade associate to substantiate products for safety before they enter the market. According to the FDA, “Failure to adequately substantiate the safety of a......

Words: 27198 - Pages: 109

Free Essay


...output to the file. Error messages are appended to the error.log file. Show your session. 11. Create a file using the cat command that contains the following data. Once you have created the file, display its content with the cat command. Show your session. $ cat > This data is to be stored in a file called by using the cat command. We can create the file with this data by using a text editor such as vi. However, the purpose of this exercise is to show an interesting use of output redirection. 12. Combine data in the following files (in this order) and append it to the all.labs file: lab1, lab2, lab3, and lab4. Any errors should be redirected to the error.log file. Show your session. $ cat lab1 lab2 lab3 lab4 >> all.labs 2> error.log 13. The smallFile file used in Lab 10 contains student records. Use a command line to display the records for the top five students in ascending (sorted) order, i.e., with the highest GPA student’s record displayed first. Show your session. $ sort +3 -r -b smallFile | head -5 14. Create two FIFOs, called fifo1 and fifo2. Use these FIFOs, the tee command, and I/O redirection operators to generate the following output: total number of processes running on the system, status of all daemon processes, and total number of daemons running on the system. Show your work. 15. Log out. $...

Words: 5471 - Pages: 22

Premium Essay


...Name ____Anjad itayem______________ Projectile Motion Go to and click on Run Now. Pre Lab Reflections: What are the • What forces are at play on a body under fall ? gravity and air resistance • Make a prediction of which angle results in maximum range. My prediction is that angel of 70 degrees will be the mazimum range Activity: - Open the sim, projectile motion. - Familiarize yourself with the variables shown there. - Ensure the air resistance check box remains unchecked. - Using the mouse set the angle of projection(i) to 5 deg. Alternatively enter the value in directly. - Set the initial speed to a value U=15m/s . - Click on Fire to start the projectile and record the corresponding value of the range R. - Repeat with values i= 10,15,20,25,30,35,40,45,50,60,70,75,80,85. - Draw a graph of Range (R) against Angle of projection (i) You may want your lay out to appear like in the table. U=……… |Angle (i) |Range(m) | |5 |9.7 | |10 |12.2 | |15 |14.9 | |20 |17.5 | |30 |21.8 | |35 |23.2 ...

Words: 404 - Pages: 2

Premium Essay


...click Install 113 Windows Server 2008 - Network Administration 5. Installation will be Completed click Close Note: - Repeat the process of LAB2 on Router-2 (SYS3) also. 114 Windows Server 2008 - Network Administration Lab – 3: Enabling Routing on Router1 & Router2 SYS2 – CONFIGURATION 1. Click Start Programs Administrative Tools Routing And Remote Access 2. Right click on system name Configure & Enable Routing and Remote Access 115 Windows Server 2008 - Network Administration 3. Click Next 4. Select Custom configuration click Next. 5. Select LAN routing Next 116 Windows Server 2008 - Network Administration 6. Click Finish 7. Click Start service Note: - Repeat the process of LAB3 on Router-2 (SYS3) also. 117 Windows Server 2008 - Network Administration Lab – 4: Configuring Static Routes SYS2 – CONFIGURATION ON ROUTER 1: 1. Go to Routing and Remote access Expand System name Expand IPv4Select Static Routes Right click New Static Route 2. Define the static route as mentioned below click OK. Interface Destination Network Mask Gateway Metric 256 118 Windows Server 2008 - Network Administration SYS3 – CONFIGURATION ON ROUTER 2: 1. Go to Routing and Remote access Expand System name Expand IPv4 Select Static Routes Right click New Static Route 2. Define the static route as mentioned below click OK. Interface Destination

Words: 12134 - Pages: 49

Premium Essay

Ip Subnetting Project

...Members of the sales and finance department have abused internet privileges. For assigning IP addresses you can pick any one from the following network addresses. Fc00::/7   IP ADDRESSING TABLE Location Number of IP Addresses Required Address Block Assigned San Francisco 1290 Denver Region Denver Campus 441 Remote Office 1 28 Call Center 1 150 Remote Office 2 35 Houston Region Houston Campus 329 Remote Office 3 21 Call Center 2 135 Research and Development R&D IPv6 Lab1 600 R&D IPv6 Lab2 310 R&D IPv6 Lab3 90 Deliverables: Your paper should address the following XUMUC Network Issues. Addresses the issues described above. • Create VLAN, as appropriate, to minimize and Isolate broadcast traffic. • Reduce WAN Traffic • Develop a new IP scheme summarizing at points shown in the diagram The Assignment must comply with APA style and should contain: • Cover page • Index Page • Main Body (3 to 5 Pages) Not to exceed 5 pages of Main body • Executive summary • Technical details (including any assumptions) o Details that address all issues described above o Completed IP addressing table (including summarized routes for the Denver and Houston regions), o Updated network diagram and a conclusion. o Router or Switch Configuration......

Words: 526 - Pages: 3

Free Essay

Book Review

...system can be classified as suitable for the skating board selling because of its ability to integrate with updates. Files from the POS can be downloaded and updated on a new POS system. The POS also required very faint data massage for data entry and customization. This is proves its user friendliness especially with the seamless customization of the input data thus improving its suitability in skate board selling. Mail merge is one of the important factors in any POS. it gives the system the ability to track valued customers of a business. Mail merge allows the shop to appreciate its frequent customers by discounting their next purchases. This makes the proposed pos suitable for selling the skating boards. Other factors not covered by lab3 sheet evaluation like security, pricing and general reporting should also be considered to arrive at a better recommendation for the suitability of the POS system. Task 2 Alternative solutions are meant to ensure that the client settles on the best POS based on their quality and performance. The alternate solutions should offer different point of views for the POS, this diverse view allows the user to flex their decisions and go for what satisfies their requirements. Square is one of the alternative solutions for the POS. The Square POS is fully customized to integrate to existing hardware. One of the outstanding pros of square is that it accepts all common credit and debit cards. It also allows next day deposits. This means......

Words: 2915 - Pages: 12

Free Essay


...ET1410 - Module 2 - Homework Wk3 Due: Beginning of Class Week 4 Student Name: _________________________ Instructions: This is a homework assignment that covers Week 3 of our ET1410 class. You should neatly show your steps in the middle column, and provide your final answer in the right hand column. NEATNESS COUNTS. You must work in pencil, not pen. Must include units of measure in your answer!!! If no units, or incorrect units, points will be deducted. ProblemNo. | Your Solution | Final Answer (Restate Your Final Answer Here) | 1 | The upper critical frequency of an op-amp’s open-loop response is 200 Hz. If the midrange gain is 175,000 what is: (a) ideal gain at 200 Hz? (b) the actual gain? (c) The op-amps open loop bandwidth? | (a)____________(b)____________(c)____________ | 2 | Determine the attenuation of an RC lag network with fc = 12 kHz for each of the following frequencies. (a) 1 kHz (b) 5 kHz (c) 12 kHz (d) 20 kHz (e) 100 kHz | (a)____________(b)____________(c)____________(d)____________(e)____________ | 3 | Determine the phase shift through the network at a frequency of 2 kHz: | | 4 | Determine the phase shift through the network at a frequency of 2 kHz: | | 5 | Determine the phase shift through the network at a frequency of 2 kHz: | | 6 | A certain op-amp has three internal amplifier stages with midrange gains of 30dB, 40dB, and 20dB. Each stage also has a critical frequency associated with it as follows: fc1=......

Words: 484 - Pages: 2

Free Essay

En1320 Lab3

...Alyssa Bauman En1320 Lab3 “Why We Crave Horror Movies” by Steven King presents an intriguing philosophy of watching horror movies. I believe that the purpose behind this article is to appeal to the reader’s unrealized dark side. King implies that are able to overcome their hysterical fear of things when they’re confronted with it and watching a horror movie is the easiest way to do that. He explains that in some way we all have this courage to overcome our deepest fears and one of the ways we show it is placing ourselves, in this case a movie theater, directly in front of what we know will scare us. The intended audience for this article is most likely the younger age demographic. Horror Movies are especially popular with ages 15-35. When you are younger you have this need to seek out new experience and thrills. Throughout the essay King directs a message to the young by making a comparison of horror movies to roller coasters describing the excitement that is felt throughout the ride. King is trying to persuade his reading audience to watch horror movies that bring his popularity up because he has books that have been made into movies. Although persuasive, King's article does not have factual evidence to solidify his argument that we all crave horror movies. The article uses many rhetorical strategies such as: compare and contrast, analysis and evaluation, cause and effect, absolutes, generalizations, and assumptions. King's ability to use these strategies......

Words: 373 - Pages: 2

Premium Essay

Phys216 Lab3

...Worksheet for Interactive Lab3: Circular Motion Name _____________ Physics 216 Grade ___/42 Date ______ Circular motion is one of the fundamental building blocks for understanding the physical world because it is so common. This interactive lets you examine the basic ideas of kinematics and forces for objects moving in circular motion. 1. (6 points) Use the controls under Show Vectors to draw arrows for several different quantities. The velocity vector is drawn in a special way: a big, bold arrow showing its direction and magnitude, plus smaller arrows for its horizontal and vertical components. * How are the directions of the acceleration and force vectors related? Force has a magnitude and a direction, and it is a vector. If a force is applied to an object, the object will accelerate in proportion to the magnitude of the force and in the direction of the applied force * What about the directions of the velocity and force vectors? The velocity of the object changes in response to the application of force. * And how are they influenced by the increase in mass and velocity slide bars? This question can be answered by the equation F = ma or force equals the product of mass and acceleration. An increase in mass or acceleration will result in more force. 2. (6 points) The large slider on the left changes the angle at which you view the spinning system. Try watching the motion from above (the default) and from the side. What would the system look......

Words: 1008 - Pages: 5

#kultura | regarder Ocean's 8 2018 1080p BluRay Rip DD5.1.x264 Telecharge | Pis Yedili