1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
|
5.1) It avoids the worry of running out of IP addresses on the local
network (1)
5.2) Because the external ip address of the computer will be the
same for the entire network, meaning each lan only takes up 1 IP address
(2)
5.3) By blocking websites that may contain malware on a blacklist basis.
By blocking all comunications through specific ports that could be holding
dangerous info. By inspecting all incoming data and blocking it if it
is dangerous. By redirecting some sites to other ones, avoiding tracking
sites.
(3)
5.4) A subnet mask will be used to check if the 2 computers are
connected to eachother via the same router, or if they can comunicate
via a chain of local routers. The packets will be set over a network by
first sending them down the link (physcal) connection, to the router,
they will have been processed to work with the ip protocol, and tcp or
udp, and a applications specific formating. The packet will be sent to
the routher which will check if the device that is going to recive the
data is on the same network, if it is, it will send it straight to it,
otherwise it will be sent over the internet. Packet switching will be
used to ensure that the data is sent quickly. The packet will be broken
into many peices and sent accorss many different wires accross the world.
When the data is recived on the otherside it will be put back together in
the right order. The data will have been sent with a checksum, this can
be checked by the recipient. It will contain some form of information,
in a known format (like the number of 1's in the data) and check if
that value matches what was recived in the packet. If it is not, then
the data was currupted, and the recipient will ask for it to be resent.
When it is sent properly the process ends.
(8)
2)a)
|