summaryrefslogtreecommitdiff
path: root/comp/work/57/question
diff options
context:
space:
mode:
Diffstat (limited to 'comp/work/57/question')
-rw-r--r--comp/work/57/question35
1 files changed, 35 insertions, 0 deletions
diff --git a/comp/work/57/question b/comp/work/57/question
new file mode 100644
index 0000000..9ee9079
--- /dev/null
+++ b/comp/work/57/question
@@ -0,0 +1,35 @@
+5.1) It avoids the worry of running out of IP addresses on the local
+network (1)
+
+5.2) Because the external ip address of the computer will be the
+same for the entire network, meaning each lan only takes up 1 IP address
+(2)
+
+5.3) By blocking websites that may contain malware on a blacklist basis.
+By blocking all comunications through specific ports that could be holding
+dangerous info. By inspecting all incoming data and blocking it if it
+is dangerous. By redirecting some sites to other ones, avoiding tracking
+sites.
+(3)
+
+5.4) A subnet mask will be used to check if the 2 computers are
+connected to eachother via the same router, or if they can comunicate
+via a chain of local routers. The packets will be set over a network by
+first sending them down the link (physcal) connection, to the router,
+they will have been processed to work with the ip protocol, and tcp or
+udp, and a applications specific formating. The packet will be sent to
+the routher which will check if the device that is going to recive the
+data is on the same network, if it is, it will send it straight to it,
+otherwise it will be sent over the internet. Packet switching will be
+used to ensure that the data is sent quickly. The packet will be broken
+into many peices and sent accorss many different wires accross the world.
+When the data is recived on the otherside it will be put back together in
+the right order. The data will have been sent with a checksum, this can
+be checked by the recipient. It will contain some form of information,
+in a known format (like the number of 1's in the data) and check if
+that value matches what was recived in the packet. If it is not, then
+the data was currupted, and the recipient will ask for it to be resent.
+When it is sent properly the process ends.
+(8)
+
+2)a)