1. Login to gain access to Desktop User Environment 2. Click Start Menu Button 3. Click the Run Option 4. Type cmd in the available box 5. Once the Command prompt is displayed type the ping command with a space then the PC host name or IP Address 6. Press Enter to Execute the Ping 7. Verify the Results for Echo Replies that Validates Communications
The process which initiates the communication is the client; the process that waits to be contacted is the server.
the two main types of communications are emailing and socialising
telephone, telegram
A basic communications system consists of---------- 1.Two computers, one to send and one to receive data 2.communications devices that send and receive data 3. a communications channel over wich data is sent 4.All of the above
Dyadic communication is the communication between two persons who interact face to face as senders and receivers. Even telephone conversations come under this type, where two people have a conversation. We can say there are two types of dyadic communications, they are, formal and informal. Formal dyadic communications are serious conversations between family and friends, interviews, confessions or counseling. Informal dyadic communications are chatting between friends and family or lighthearted joking. It is impossible not to communicate, and it is important to remember that not all communication within the dyad is verbal. It is often true that much of our communication is non-verbal. Body language, posture, tone of voice, and facial expressions must also be considered when interpreting messages in dyadic communication or in any other type of communication.
Man-In-The-Middle: An attack in which communications between two hosts are routed through the attacker's host. The attacker can observe, modify, and/or block selected traffic before relaying to the intended host. Communications between the target hosts appear normal.Replay: An attack in which a copy of communications between two hosts is obtained by the attacker. The attacker retransmits selected portions of the copied communications at a later time for nefarious purposes such as creating duplicate transactions, circumventing authentication, etc.diffrent: a replay attack is a more specific type of man-in-the-middle attack. I view the biggest difference in the intent. In the man-in-the-middle attack the intent is simply to capture the data, but in a replay attack the intent is to reuse the data in an an attack.
Using OSI reference model explain the data communication between two hosts?
You can have a maximum of four hubs between any two hosts (or from a host to the next switch).
A network layer is not needed if both the hosts are in the same network. A data link layer can be used in such cases.
Session Layer.
Communications between two designated stations only.
Dedicated
Reachability
• identifies the communicating applications• identifies multiple conversations between the hosts
Session Layer
• identifies the communicating applications• identifies multiple conversations between the hosts
UDP