Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

(case project 7-1) DO NOT ANSWER 7-1 IT IS JUST A REFERENCE You want to transfer

ID: 3658996 • Letter: #

Question

(case project 7-1) DO NOT ANSWER 7-1 IT IS JUST A REFERENCE You want to transfer a document from one computer to another, and you want the document to be encrypted. The destination computer is on another network, so you know the data will have to travel through one or more routers. The network technology used on your network is Ethernet, but the technology on the destination network is token ring. From what you have learned about networking, should this document transfer work? Why or why not? Which layers of OSI model are involved in the italicized parts of this description? THIS ONE NEEDS A ANSWER The CNT books network described in case project 7-1 is expanding. there are 200 more users stations in the building, and a total of five floors are in use by the network. You have kept up with the design so far with a network of five subnets, each with its own router. The company lased a building across the street. You expect at least four subnets to be added to the design. The owner is concerned about how to connect to the building across the street and he thinks the cost of contracting with a communications provider is too expensive for such a short distance. What solution can you suggest for connecting the building across the street with the existing building?

Explanation / Answer

For first part (which you said not needed):: Layers that are most likely involved: 1- A computer will not connect to the network. After some investigation you find that the patch cable is note terminated properly. 2- A computer can access resources on the local LAN but not on a different subnet. You find that the computer’s default gateway is not configures correctly. 3- You can ping a computer that you are trying to transfer files to via FTP, but you can’t communicate using FTP. 4- All computers connected to a particular hub have lost network connectivity. You determine that the hub is the problem. 5- You receive an encrypted text file, but when you open it, the text is unreadable. You determine that decryption did not take place as it should have. For second part of your question:: This is a some sort of solution and may not helpful always............................. As we know dynamic addresses are popular with Internet service providers, because it enables them to use fewer IP addresses than their total number of custom- ers. They only need an address for each customer who is active at any one time. Globally routable IP addresses cost money, and some authorities that specialize in the assignment of addresses (such as RIPE, the European RIR) are very strict on IP address usage for ISP's. Assigning addresses dynami- cally allows ISPs to save money, and they will often charge extra to provide a static IP address to their customers.