Free Essay

Short Answer Protocol

In:

Submitted By vortex1011
Words 431
Pages 2
#1
Open standards vary in multitude and help secure many aspects of a network. Since these standards are open, both parties share interoperability and the success of accessing their data, services, and resources are much higher than if they were not using open standards. Some advantages of using open standards are: independence from using a single application to access resources, access is not restricted to certain hardware platforms, long-term access to files and resources and the overall integrity of the architectural framework is secure and sound.

#2
A layered architecture is not the only way to go but the most logical one. As a man of detail and quality control, I prefer the ability to alter the implementation of a service or feature without affecting other key components of the system. Changing or replacing components from one layer will not obstruct the functionality of the others, making layered architecture an efficient and time managing choice to any complex system. Maintainability, flexibility and scalability are important within system architecture.

#3
A protocol is a set of rules that outlines how a task is to be finalized. Within networking, protocols define the set of rules for communication between and across numerous systems. But within each system there needs to be the same protocol so communication can flow smoothly between each, just like within society when you order food at a restaurant, you read your preferred item from the menu and speak your choice through the most commonly used language within the region or area.

#4
Local Area Network (LAN): is confined in a small geographical area (business buildings or homes) and connects devices such as printers, computers, servers, and routers.

Metropolitan Area Network (MAN): is an extension of (LAN) but can cover a larger scope and area such as a city. This type can be configured using a service provider.

Wide Area Network (WAN): Just like a (MAN) but can spread over larger boundaries such as countries.

Backbone Network: Usually contains more than one (LAN) connected through a single link known as a high-speed circuit.

#5
The OSI Model encloses 7-layers and is protocol specific, specific responsibilities are defined within each layer, the network layer contains connectionless and connection-oriented services and the transport layer contains connection oriented services

The TCP/IP Model encloses 4-layers and is protocol independent, the responsibilities for each layer are not specific, the transport layers comprises of the connectionless and connection-oriented services and the network layer holds the connectionless service.

The OSI model is the most frequently used model within networking.

Similar Documents

Premium Essay

Hotel Management Srs

...difference between computer network and distributed system? 3. What is client-server model? 4. What are local area networks? 5. What are metropolitan area networks? 6. What are wide area networks? 7. What is multicasting? 8. What is broadcasting? 9. What is unicasting? 10. What are switching elements? 11. What is routing algorithm? 12. What is blue tooth? 13. What is communication subnet? 14. What are peers? 15. What is a protocol stack? 16. What is topology? 17. What is ring topology? 18. What is star topology? 19. What is bus topology? 20. What is mesh topology? 21. What is tree topology? 22. What is connection-oriented service? 23. What is connection less service? 24. What is a datagram service? 25. What is store and forward network? 26. What is a cell? KNOWLEDGE OF TERMINOLOGY 27. Define broadcast links. 28. Define point-to-point links 29. Define gateway 30. Define Internet work. 31. Define protocol. 32. Define interface. 33. Define bandwidth. KNOWLEDGE OF CLASSIFICATION AND CATEGORY 34. Give the two types of transmission technology. 35. Give the different types of services. 36. Mention the different types of reference models 37. Mention the different layers of OSI reference model. 38. Mention the different layers of TCP/IP reference model. 39. List the three concepts that are central to OSI model. 40. List the critiques of...

Words: 2997 - Pages: 12

Premium Essay

70-642

...Lesson 3 Answers for Knowledge Assessment Matching 1. e 2. h 3. f 4. a 5. d 6. b 7. g 8. i 9. c 10. j Multiple Choice 1. c When a DHCP-configured computer boots up, it will broadcast a DHCPDISCOVER packet to locate any available DHCP server in order to request DHCP IP address information. 2. c DHCP operates at the Application Layer of the OSI model. 3. a The TFTP protocol is a lightweight alternative to FTP. It is capable of this level of efficiency because it uses the connectionless User Datagram Protocol (UDP) for communication rather than the acknowledgement-based Transmission Control Protocol (TCP). 4. b T1 is a time indicator that corresponds to 50% of the DHCP lease time; T2 corresponds to 87.5% of the total DHCP lease time. 5. b A DHCP server will hand out IP addresses to requesting clients from its available address pool, which consists of the total address range less any IP addresses that have been configured as exclusions from the available range. 6. c The TFTP protocol was used by BOOTP, the predecessor to DHCP, which was used to provide automatic IP addressing information to diskless workstations. 7. c When you reconcile a server or a scope, the DHCP service uses both the summary information in the registry and the detailed information in the DHCP database to reconstruct the most current view of the DHCP service. 8. c Superscopes contain only a list of member scopes...

Words: 1569 - Pages: 7

Premium Essay

Engineer

...EECE 350/450 Computer Networks Spring 2013 Course information   Catalogue Description   A course that outlines data communications; wide area networks; circuit and packet switching; routing; congestion control; local area networks; communications architecture and protocols; internetworking.   Pre-requisites   By topic: •  Programming language (such as C++) •  Basic understanding of probability theory and data structures •  Basic understanding of the internal operations of computers   By course: •  STAT 230 Probability and Random Variables, and EECE 330 Data Structures and Algorithms. Instructor   Ayman Kayssi                   Office: 404, Raymond Ghosn Building (RGB) Office Hours: Monday 2 – 3:30 pm and by appointment Extension: 3499 Email: ayman@aub.edu.lb Web: aub.edu/~ayman Messaging: +961 3 965 258 LinkedIn: lb.linkedin.com/in/aymankayssi Twitter: akayssi Facebook: akayssi Course objectives   The objectives of this course are to give students:   An understanding of the basic principles of computer networking   An overview of the main technologies used in computer networks   An overview of internetworking principles and how the Internet protocols, routing, and applications operate   The basic background in computer networks that will allow them to practice in this field, and that will form the foundation for more advanced courses in networking   The basic skills needed to write network applications. Topics covered in this course ...

Words: 1522 - Pages: 7

Free Essay

Test

...layer is equipped to request retransmission of all erroneous or missing PDUs when reassembly is underway, so that it can guarantee reliable delivery of data from sender to receiver. Multiple Choice Identify the choice that best completes the statement or answers the question. __b__ 1. The ____ includes the physical transmission medium (cables or wireless media) that any network must use to send and receive the signals that constitute the physical expression of networked communications. a. | Data Link layer | c. | Network layer | b. | Physical layer | d. | Transport layer | ___a_ 2. The ____ is where ongoing communications between a sender and a receiver, somewhat like a telephone conversation, are set up, maintained, and then terminated, or torn down,as needed. a. | Session layer | c. | Network layer | b. | Physical layer | d. | Presentation layer | __a__ 3. The ____ defines an interface that applications can use to request network services, rather than referring directly to applications themselves. a. | Application layer | c. | Session layer | b. | Physical layer | d. | Presentation layer | _c___ 4. The TCP/IP Application layer also is known as the ____ layer because this is where the protocol stack interfaces with applications or processes on...

Words: 694 - Pages: 3

Premium Essay

Nt1210 Unit 3 Assignment 1

...The physical layer sits just below the data link layer. 6. B. IEEE D. ANSI 7. D. To keep intellectual property rights to the technology inside the company 8. B. IP is a network layer protocol. 9. B. TCP/IP 10. B. The lower four layers of TCP/IP define the same kinds of functions as the matching layer numbers from OSI. 11. C. The PCs use two wires to create a circuit to send data from PC1 to PC2. 12. B. Ethernet defines MAC addresses, but when used in a TCP/IP network, it does not use the addresses, instead relying on IP addresses. 13. D. Datagram 14. B. Can be written in DDN format D. Used by routers to make a forwarding decision 15. A. 48 bits in length 16. A. LANs generally connect devices that are nearer to each other, compared to WANs. D. LANs are purchased, and WANs are leased. 17. B. Two TCP/IP data-link protocols are Ethernet and PPP. C. Data-link protocols define addresses that identify devices connected to the underlying physical link. 18. D. None of the answers is correct. 19. D. None of the answers is correct. 20. A. Data-link header B. Network layer header C. Transport layer header TCP/IP network: Short for Transmission Control Protocol/Internet Protocol....

Words: 699 - Pages: 3

Premium Essay

Networking Essays

...Answers for Page 30 (Short Answer Question 1-5) 1. Open standards are openly documented standards, published without restrictions that limit implementations. It’s advantages are (a). it makes for easier maintenance, upgrade, and troubleshooting for technology infrastructures. (b). It also helps in both Software and Hardware in terms of providing data and telecommunications technologies. 2. Layered Architecture can be viewed as a beneficial because they are there to design pattern that structures applications so they can be decomposed into groups of subtasks such that each group of subtasks is assigned a specific set of functionalities and responsibilities. 3. Protocol is a set of rules that determine how something is performed or accomplished. It can be used for our daily routine in our life. Example. (Technological protocol)- Encoding Scheme is a way of transforming one type of data or information into another. Translating English into French. 4. The four different types of Networks are LAN,WAN,MAN, and Area Networks. It’s characteristics of each are; * LAN - Local Area Network * WAN - Wide Area Network * MAN - Metropolitan Area Network * BN – Network in a single building or is used to connect other networks of the enterprise. 5 . OSI and TCP/IP models similar – The main similarities between the two models include the following: - Both of the models share a similar architecture. This can be illustrated by the fact that both of them are constructed...

Words: 301 - Pages: 2

Free Essay

70-236, Lesson 1

...contain attachments sent between people on a computer or computer network. Answer: Electronic mail (email) Section Ref: How Email Works 2. Microsoft Outlook and Eudora are examples of _____________________. Answer: Mail Transfer Agent (MTA) Section Ref: How Email Works 3. The _____________ DNS record is used to indicate the email server for a particular domain. Answer: Mail eXchanger (MX) Section Ref: How Email Works 4. When email is sent, the MX record with the lowest ____________________ will be the first mail server contacted to receive email. Answer: priority Section Ref: How Email Works 5. _________________ is used to rotate multiple host or MX DNS records. Answer: Round-robin Section Ref: DNS and Email Relay 6. The ____________________ handles all email relay within the organization and is functionally equivalent to the MTA and MDA in a generic email system. Answer: Hub Transport (HUB) Section Ref: Exchange Server 2007 Roles 7. The ____________ protocol is used to send email. Answer: Simple Mail Transfer Protocol (SMTP) Section Ref: How Email Works 8. The ________________ Exchange 2007 role allows users to access email, voicemail and fax messages from a MAPI client. Answer: Unified Messaging (UM) Section Ref: Exchange Server 2007 Roles Short Answer 1. What command would you use to look up host (A) or Mail eXchanger records? Answer: Nslookup Section Ref: Test DNS Name Resolution Using NSLOOKUP 2. What would...

Words: 331 - Pages: 2

Free Essay

Case Study

...Anx.31 J - M Sc CS (SDE) 2007-08 with MQP Page 1 of 16 Annexure No. SCAA Dated BHARATHIAR UNIVERSITY, COIMBATORE – 641 046 M. Sc COMPUTER SCIENCE For School of Distance Education (Effective from the academic Year 2007-2008) Scheme of Examinations 31 J 29.02.2008 Year Subject and Paper I Paper I Paper II Paper III Paper IV Practical I Paper V Paper VI Paper VII Practical II Project Advanced Computer Architecture Computer Graphics & Multimedia Software Engineering Computer Networks Computer Graphics and Multimedia Lab Advanced Operating System Internet programming and Web Design Data Mining and Warehousing Internet programming and Web Design Lab Project Work and Viva Voce Total University Examinations Durations Max in Hrs Marks 3 100 3 100 3 100 3 100 3 100 3 3 3 3 100 100 100 100 100 1000 II For project work and viva voce (External) Breakup: Project Evaluation : 75 Viva Voce : 25 1 Anx.31 J - M Sc CS (SDE) 2007-08 with MQP Page 2 of 16 YEAR – I PAPER I: ADVANCED COMPUTER ARCHITECTURE Subject Description: This paper presents the concept of parallel processing, solving problem in parallel processing, Parallel algorithms and different types of processors. Goal: To enable the students to learn the Architecture of the Computer. Objectives: On successful completion of the course the students should have: Understand the concept of Parallel Processing. Learnt the different types of Processors. Learnt the Parallel algorithms. Content: Unit I...

Words: 3613 - Pages: 15

Free Essay

Chapter 11 Ccna

...Chapter 11 True/False Indicate whether the statement is true or false. ____ 1. Asynchronous serial connections are typically used with analog modems. ____ 2. The benefit of multilink is that you can combine the bandwidth of two separate devices over one logical connection. ____ 3. Compared with PAP, CHAP provides a much more simple authentication process. ____ 4. Using authentication with PPP connections is mandatory. ____ 5. The Frame Relay map can be built automatically or statically depending on the Frame Relay topology. Multiple Choice Identify the choice that best completes the statement or answers the question. ____ 6. PPP is an Internet standard protocol defined in RFCs 2153 and ____. a.|1551|c.|2234| b.|1661|d.|2532| ____ 7. The ____ is used at the Data Link layer to establish, configure, and test the connection. a.|NCP|c.|IPCP| b.|ATCP|d.|LCP| ____ 8. In a production environment, you can use the ____ command from interface configuration mode, which will automatically shut down that interface when looping is detected. a.|off-looped-interface|c.|down-when-looped| b.|looped off|d.|off-when-lopped| ____ 9. ____ checks the reliability of the link by monitoring the number of errors, latency between requests, connection retries, and connection failures on the PPP link. a.|LQM|c.|CHAP| b.|PAP|d.|LCDI| ____ 10. Once you have completed configuring your PPP interface, you can verify the changes using the ____ command. a.|show...

Words: 2989 - Pages: 12

Premium Essay

Paper

...Topic: Insider Access for Law Enforcement -- Legal or Not? Read: Law enforcement agencies use digital technologies to capture and record Voice over Internet Protocol (VoIP) conversations (to implement court-authorized wiretaps). The following resources discuss various aspects of the legal issues and concerns which arise during the collection of evidence from digital wiretaps or harvesting of data from live networks during the course of an investigation. 1. Timberg, C., & Nakashima, E. (2012, July 25). Skype makes chats and user data more available to police. The Washington Post. Retrieved from http://www.washingtonpost.com/business/economy/skype-makes-chats-and-user-data-more-available-to-police/2012/07/25/gJQAobI39W_story.html 2. Office of Justice Programs. (2008). Voice over Internet Protocol fact sheet. Retrieved from http://www.nij.gov/topics/technology/communication/voip/welcome.htm 3. Office of Justice Programs. (2006, February). Telephony implications of Voice over Internet Protocol. In Short: Toward Criminal Justice Solutions. Retrieved from https://www.ncjrs.gov/pdffiles1/nij/212976.pdf Do: Using a textbook, the three sources above, and/or additional authoritative sources, identify and research three legal issues (e.g. constitutional rights, preservation of evidence, and preservation of evidence) that could arise if a VoIP service provider gives law enforcement officials inside access to its networks for the purposes of capturing and recording Voice...

Words: 513 - Pages: 3

Premium Essay

Information Technology

...Review Questions for Test-1 (with Answers): Chapter 1: Introduction to Data Communications Outline 1.1 Network Basics 1.2 Network Layer Model (most important) 1.3 Network Standards 1.4 Future Trends (least important) Answers to End-of-Chapter Questions 1. Describe the progression of communications systems from the 1800s to the present. Communications systems progression from the 1800s to the present: 1837 Invention of the telegraph 1876 Invention of the telephone 1877 Telephone system regulation begins in Canada 1878 Telephone system regulation begins in the United States 1879 Direct dialed long distance service begins 1880 Satellites begin to transmit international telephone calls 1881 Caterfone court decision permits non-Bell telephone equipment to be used 1970 Court permits MCI to provide long distance services 1984 Breakup of AT&T 1985 Cellular phones enter service 1996 Telecommunications Act of 1996 deregulates American telephone system 2. Why are network layers important? Communication networks are often broken into a series of layers, each of which can be defined separately, to enable vendors to develop software and hardware that can work together in the overall network. 3. Describe the four layers in the network model used in this book and what they do. • The application layer is the application software used by the user. • The network layer takes the message generated...

Words: 29622 - Pages: 119

Premium Essay

Margaret Burns Transition Of Care Essay

...Short answer: Both the discharging and admitting facilities failed in their duty of care towards Margaret Burns. The discharging facility neglected to double-check her orders before transfer, while the admitting facility failed to verify the correctness of the received orders before administering medications. Both facilities must review their protocols, improve communication, and implement quality improvement measures to prevent such errors in the future. Holding both parties accountable is crucial to patient safety and care quality. 6. What is the difference between a'smart' and a Which health care facility is responsible for the medication errors? What obligations does the facility have to Margaret? To her family. Both facilities should be held responsible; neither of them checked the orders to ensure...

Words: 566 - Pages: 3

Free Essay

Syllabus

...SCHEME OF EXAMINATION FOR MASTER OF COMPUTER APPLICATIONS (MCA) (SIX-SEMESTER Programme) |Semester – I | |Paper |Title of the Paper |Duration |Maximum Marks |Total | |No. | |Of Exam | | | | | | |Theory |Sessional* | | |MCA-101 |Computer Fundamentals and Problem Solving Using C |3 Hours |80 |20 |100 | |MCA-102 |Computer Organisation |3 Hours |80 |20 |100 | |MCA-103 |Discrete Mathematical Structures |3 Hours |80 |20 |100 | |MCA-104 |Software Engineering |3 Hours |80 |20 |100 | |MCA-105 |Computer Oriented Numerical and Statistical Methods |3 Hours |80 |20 |100 | |MCA-106 |Software Laboratory - I |3 Hours | | |100 | | |C (Based on MCA-101) |...

Words: 13848 - Pages: 56

Premium Essay

Et1210

...Chapter 1 2 & 3 Review Questions Arcacia Godfrey 07/10/15 Mr. Gima (1). 1 bit represents one binary digit. (2). Kilobyte means approximately 106 byte. (3). 64 bits per quadruple word associated with each term. (4). The Random Access memory is used for short term memory and used to process data. (5). this is true the CPU tells the RAM which address holds the data that CPU wants to read. (6). A Character set determines in part what bits the computer stores. (7). the binary equivalent of decimal 123456789 stores in the RAM. (8). An Actuator arm is not a feature of a file system that might be used with a hard disk drive. (9). The Important features provides a convenient way to name a set of data for easier operations like copying and moving. The names gives users an easy way to reference the data and gives the CPU an easy way to identify the data it wants to read from RAM. (10). the classmate flash drive contents will not be usable by the classmate. (11). Changing the disk’s surface so that later the light will reflect differently for 0 or 1 describes how a hard disk drive physically writes a binary. (12). an internal hard disk drive is used for long term memory and connects to the CPU over a bus using a cable. (13). the components of an internal hard drive is an Actuator arm and platters. (14). RAM and optical disc drive are considered to be a solid state. (15). The Binary equivalent of decimal 123456789 the computer will need to consider. (16)....

Words: 1126 - Pages: 5

Premium Essay

Applications Project

...Junior High Grades 6-8 Protocol for Natural Disaster: Tornado Tyson Lee March 3, 2013 Information about the Protocol Living in Mississippi, there are many tornadoes that hit this area. Mississippi has on average, 29 tornadoes per year. One of nature’s most violent acts is a tornado. Tornadoes can cause enough devastation to tear through a neighborhood and demolish it and they can cause fatalities. At times, a tornado can develop so quickly that advance warning can be too little too late. When preparing for a tornado, schools need to be aware of tornado watches and warnings. The National Weather Service issues a warning when conditions are favorable for the development of a tornado and a warning is issued when a tornado has been detected. In the school, there should be someone that will be monitoring the weather radio for potential bad weather. There should also be a plan and provisions set in the school for during school hours, after school hours, and any school related activities. During school hours, there need to be a procedure for relaying this information to all faculty, staff, and students. In order to make sure that all faculty, staff, and students are prepared, in the event of a real tornado, is to have a severe weather safety plan in effect where everyone can take cover within a minute. It is important to do this with regular tornado drills. This allows for all persons to be prepared in the event of a real tornado. The evacuation...

Words: 2313 - Pages: 10