answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nevsk [136]
1 year ago
6

Open "Wireshark", then use the "File" menu and the "Open" command to open the file "Exercise One.pcap". You should see 26 packet

s listed. This set of packets describes a ‘conversation’ between a user’s client and a central server. This entire conversation happens automatically, after a user types something and hits enter. Look at the packets to answer the following questions in relation to this conversation. In answering the following questions, use brief descriptions. For example, "In frame X, the client requests a web page, and in frame Y, the server delivers the content of the page." Hint: See the accompanying document titled the "QuickStart Guide" – Look under the appendix describing "Hits Versus Page Views". Hint: a favicon.ico is a small graphic that can be used as an icon to identify a web page. In the following graphic the colorful "G" to the left is a favicon.ico.? What is the IP address of the client that initiates the conversation? Use the first two packets to identify the server that is going to be contacted. List the common name, and three IP addresses that can be used for the server. What is happening in frames 3, 4, and 5? What is happening in frames 6 and 7? Ignore frame eight. However, for your information, frame eight is used to manage flow control. What is happening in frames nine and ten? How are these two frames related? What happens in packet 11? After the initial set of packets is received, the client sends out a new request in packet 12. This occurs automatically without any action by the user. Why does this occur? See the first "hint" to the left. What is occurring in packets 13 through 22? Explain what happens in packets 23 through 26. See the second "hint" to the left. In one sentence describe what the user was doing (Reading email? Accessing a web page? FTP? Other?).
Computers and Technology
1 answer:
murzikaleks [220]1 year ago
8 0
Idk idk idk idk idk idk
You might be interested in
Write a loop to populate the list user_guesses with a number of guesses. The variable num_guesses is the number of guesses the u
Masja [62]

Answer:

num_guesses = int(input())

user_guesses = []

for i in range(num_guesses):

    x = int(input())

    user_guesses.append(x)

   

print(user_guesses)

Explanation:

This solution is provided in Python

This line prompts the user for a number of guesses

num_guesses = int(input())

This line initializes an empty list

user_guesses = []

This loop lets user input each guess

for i in range(num_guesses):

This line takes user input for each guess

    x = int(input())

This appends the input to a list

    user_guesses.append(x)

This prints the user guesses    

print(user_guesses)

6 0
1 year ago
how do you make a circuit so 1 switch will turn on/off all the lights(3 lights) and a second switch will change the lights from
expeople1 [14]

Parallel circuit. On a wire you put the lights and one switch, on the other you put a resistor and another switch. (and the third wire contains the generator)
7 0
1 year ago
Read 2 more answers
Mobile computing has two major characteristics that differentiate it from other forms of computing. What are these two character
olya-2409 [2.1K]

Answer:

mobility and broad reach  

Explanation:

The two major characteristics of mobile computing are:

Mobility: It basically refers to the portability. Mobility means that users can carry their mobile device wherever they go. This facilitates real-time communication with other devices. Users can take a mobile device anywhere and can contact with other devices and systems via a wireless network for example a user, wherever he happens to be, can log in to his email account to check his emails using his mobile phone.

Broad Reach: It basically means that the mobile device users can be reached at any time. This means that the users of an open mobile device can be instantaneously contacted. Having an open mobile device means that it can be reached by or connected to other mobile networks. However mobile users also have options to restrict specific messages or calls.

6 0
2 years ago
C# Write, compile, and test a program named PersonalInfo that displays a person’s name, birthdate, work phone number, and cell p
Soloha48 [4]

Answer:

#include <stdio.h>

#Include<iostream>

using namespace std;

//Define required function

PersonalInfo( )   {

    printf("Name   : Robert Josh\n");  

    printf("DOB    : July 14, 1975\n");  

    printf("Work Phone : 00-00000000\n");  

    printf("Cell Phone : 11-777777777\n");  

    return(0);  

 }

int main()   {

    //Call function

 PersonalInfo( );

 return 0;

 }

Explanation:

Its just a simple code to print required details when the function PersonalInfo is called.

5 0
2 years ago
HELP ASAP U GET BRAINLIEST
Korolek [52]
B) <span>tool bar

i hope helped ^-^</span>
7 0
2 years ago
Read 2 more answers
Other questions:
  • U.S. industries like steel, computers, and energy need to be protected from foreign competition to ensure which of the following
    6·2 answers
  • What is one effective way for employees to keep their skillsets current?
    8·2 answers
  • Prove that any amount of postage greater than or equal to 64 cents can be obtained using only 5-cent and 17-cent stamps?
    15·1 answer
  • When a typeface does not have any extra embellishments on the top and bottom of the letterforms, it is called a ________ font?
    12·1 answer
  • Which of the following best defines the term cross-platform application?(A) A program used to coordinate data sharing among mult
    14·2 answers
  • Which of these words could byte pair encoding compress the most?
    13·1 answer
  • Why is the following statement true - ideally, your information is abbreviated
    10·2 answers
  • Design and document an IP addressing scheme to meet ElectroMyCycle’s needs. Specify which IP address blocks will be assigned to
    11·1 answer
  • Quantum units of information deploy the properties of entanglement and ____ to offer exponentially greater computing power.
    9·1 answer
  • All organizations need good quality cybersecurity to ensure _____. Select 4 options.
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!