You are on page 1of 1

Brian Ghilliotti

CST 111

Electronic Commerce

Chapter 2

2/10/2019

2. The Department of Defense (DOD) realized that its communication systems were vulnerable
to rapidly becoming ineffective since they heavily single connection links between a sender and
a receiver. Thus vital communication could be cut by targeting and destroying a specific
communication link. The DOD realized that a communication system that could transmit a
message, broken down into segments called packets, which could be transmitted over multiple
links (called channels) at once was the most effective way to overcome this problem.

4. The DOD and the various academic institutions that initially developed the internet were
receiving funding from the National Science Foundation (NSF), giving considerable control of
the internet to that organization. Commercial businesses were prohibited from conducting
commercial business using the internet. As a result, larger firms began to develop their own
internet systems to carry out business once they realized the commercial value of an internet.
This compelled the NSF to gradually consider opening up the internet to some level of
privatization, before commercial businesses develop their own internet that could rival that of
the one being developed by the NSF. This was first fully implemented in 1995, when the NSF
established four hubs for national internet access, exclusively for private companies, in New
York, Chicago, San Fransisco, and Washington, D.C.

6. Border routers are routers that exist between an organization’s Local Area Network (LAN),
consisting of associated IP addresses specific to that organization, and the wider internet,
consisting of organizational IP addresses found in approximate Wide Area Networks. Border
routers both send and receive IP packet traffic to and from adjacent WAN’s.

9. TCP/IP facilitates the disassembly of a message broken down into packets measured at
eight on or off (binary) units of electrical charge. These packets are sequentially numbered and
transmitted by a sender over the internet, until it is received by a receiver, which uses TCP/IP to
reassemble the binary bit packets back into organized data. Any missing packets are resent
with a resend request for the missing packet.

10. IPv6 was established since there were only 2^32 possible IP addresses, which had been all
issued out by one of the three IP address issuing organizations by 2015 (American Registry for
Internet Numbers, Reseaux IP Europeens, and Asia-Pacific Information Center). This was an
inevitable outcome of the commercially driven expansion of the internet and the proliferation of
mobile devices. IPv6 was structured to offer up to 2^128 potential IP addresses to support
continued growth of the internet. However, IPv4 still sustains itself through subnetting (enabling
networks to be established at any point in the 32 bit IP address structure) and NAT (links
multiple IP addresses to one specific IP address inside a network) and PAT (links multiple IP
addresses to a specific port) technologies.

11. This software receives requests from different web clients and responds by sending files
back to the web clients, which in turn processes these files through its web page. The protocol
that supports this process is known as hyper text transfer protocol (HTTP).

You might also like