1. Packets from a mobile host residing in a foreign network may be blocked by the firewall in the home network because: a. Enterprise firewalls are typically configured to block packets that appear to be emanating from foreign computers but arrive on firewall's local (internal) interface. b. None of the given answers c. Enterprise firewalls cannot determine the mobile host's home address since they do not decapsulate an incoming packet. d. Enterprise firewalls are typically configured to block packets that appear to be emanating from local computers but arrive on firewall's external (Internet facing) interface.

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

1. Packets from a mobile host residing in a foreign network may be blocked by the firewall in the home network because:

a. Enterprise firewalls are typically configured to block packets that appear to be emanating from foreign computers but arrive on firewall's local (internal) interface.

b. None of the given answers

c. Enterprise firewalls cannot determine the mobile host's home address since they do not decapsulate an incoming packet.

d. Enterprise firewalls are typically configured to block packets that appear to be emanating from local computers but arrive on firewall's external (Internet facing) interface.

2. Bridging the last mile wirelessly to a customer’s premise from the provider’s base station is an example of:

a. Fixed and Wireless Connection b. Mobile and Wireless Connection. c. Mobile and Wired Connection. d. Fixed and Wired Connection.

3. The Home Agent (HA) intercepts packets for a mobile host that is currently not in its home network using:

a. Router Advertisement messages. b. Gratuitous Address Resolution Protocol (ARP) c. ARP (Address Resolution Protocol) d. Proxy ARP (Address Resolution Protocol)

4. In the context of Classical (Pure) Aloha based Medium Access Control, which of the following holds true:

a. Aloha neither coordinates the medium access nor does it resolve the contention on the MAC layer.

b. None of the other given answers.

c. Aloha uses a centralized medium access and transmission control mechanism.

d. Aloha operates in a full duplex mode.

Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Network Protocols
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education