This textbook is available Logo
Guide to Networking Essentials 8th Edition

Guide to Networking Essentials (8th Edition)

Book Edition8th Edition
SubjectComputer Science
Securing Access to Network Data
Hands-On Project
Network Switches in Depth
Hands-On Project
Protecting a Network from Malware
Hands-On Project
Using a Attacker's Tools to Stop Network Attacks
Hands-On Project
Chapter 9, Securing Access to Network Data, Hands-On Project, Exercise 9-1
Page 443

You want to transfer a document from one computer to another, and you want the document to be encrypted. The destination computer is on another network, so you know data has to travel through one or more routers. The network technology on your network is Ethernet, but the technology on the destination network is Wi-Fi. From what you have learned about networking, should this document transfer work? Why or why not? Which layers of the OSI model are involved in the italicized parts of this description?


Ethernet is a family of wired computer networking technologies commonly used in local area networks (LAN), metropolitan area networks (MAN) and wide area networks (WAN).


Indeed, the exchange should work.

The switches know the course among networks, and a WAP will deal with the change from ethernet to remote. The encryption happens higher up in the stack and isn't engaged with getting the information from point a to point b.


The stressed parts didn't come through, nonetheless...

WAP works at Layer 1

Switches work at Layer 3

Encryption happens at a more elevated level, however it's been excessively since a long time ago I examined this to recall the specific Layer, yet I think its Layer 6.

Did you like this example?
Subscribe for full access
Page 443