Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1.What are the three main internetworking protocols used in the TCP/IP Architect

ID: 3770142 • Letter: 1

Question

1.What are the three main internetworking protocols used in the TCP/IP Architecture and their respective layer names.

2. What Address used by TCP to connect sending and receiving processes

3. What are the three parts  of an IP address

4. What is the difference between routing tables and switching tables

5. What are the functions of the various IP/TCP header fields

6. What is the difference between ephemeral and well-known ports

7. What is the difference between bandwidth and spectrum

8. What are the 3 steps involved in a routing decision

9. Which address does a switch use?

10. What is the five causes of wireless propagation problems?

11. What are what T­1, T­3, SONET, OC3

12. What if an IT person wants 12 subnets how many bits would you have to steal from the host bits?

13. What is a VPN, IPsec, SSL/TLS, VPN tunnel vs VPN transport mode

14. What is a Bluetooth, WEP, 80211i, WPA, MIMO?

15. What is a Evil Twin Access point, War Driving?

16. What is a MTSO, GSM, LTE, CDMA, roaming?

17. What is a CSMA/CA + ACK, hertz, 2.4 GHz, 5 GHz?

18. What are the functions of NAT, DNS, DHCP

19. What are the elements of an SNMP network management system

20. What are the difference between MAN, WAN, LAN, PSDN, PSTN, ADSL?

Explanation / Answer

Answer :

1)The three main internetworking protocols used in the TCP/IP Architecture are Simple Mail Transfer Protocol(SMTP),File Transfer Protocol(FTP) and Telecommunication Network Protocol(Telnet) and their respective layer names are Application Layer , Transport Layer, Internet Layer, and Network Interface Layer.

2)Internet Protocol Address i.e IP address is used by TCP to connect sending and receiving processes.

3) Network number portion and host number portion are the parts of an IP address

4)Routers have tables that compute the shortest distance, change the route is taken if one stop is not responding, decreases a bit in the packet so it will die if it never gets to its destination. In switches it can be clever that they can only pass certain types of packets on certain ports, send replies, not send replies to network

5)The various fields are Protocol Version(4 bits),Header Length(4 bits),Type of service(8 bits) ,Total length(16 bits),Identification(16 bits),Flags(3 bits),Fragment offset(13 bits),Time to live(8 bits),Protocol(8 bits),Options(Variable length),Source and destination IP(32 bits each) ,Header Checksum(16 bits) and Data field.

6)An ephemeral port is a short life span transport protocol port for Internet Protocol communications allocated automatically from a predefined range by the IP software. It is used by the TCP protocol as the port assignment for the client end of a client–server communication to a well known port on a server.On the other hand well know port is the known server for the client for which the data is need to tranfered which is passed by the server which internally communicates.

7)Wider spectrum can support higher bandwidth, depending on the specific modulation schemes.Spectrum is the width of the physical radio band. Bandwidth is the achievable data transmission rate.

8)

Step 1 :Select the most specific route or the route with the longest prefix. When the router receives a packet it takes a look at the routing table and checks if it has a route to the destination of the packet.

Step 2:Next select the route with a better Administrative Distance.A router would choose to use a route over the other and choosing the one with the lower AD. Each routing protocol has its own AD and even depending on what type of route it is made.

Step 3 :Next select the route with the best metric. Routes with the same AD will most likely come from the same routing protocol,comparing each route metric is what the router will do next and it depend on which routing protocol is used as different routing protocols.

9)Switch uses  Media Access Control Address i.e MAC address.

10)The five causes of wireless propagation problems are physical obstructions,Network Range & Distance between Devices,Wireless Network Interference,Signal Sharing and Network Usage and Load.'

11)T­1, T­3, SONET, OC3 are different types of synchronous data transmission on optical medias

12)Atlest 2 bits since 24-2=14 subnets and 23-2=6 subnets.

13)VPN, IPsec, SSL/TLS, VPN tunnel are  methods used to add security and privacy to both private and public networks, like WiFi Hotspots and the Internet

14)Bluetooth is a technology through whcih we can transfer files or data from one device to other device in mobiles or tablets etc.and 802.11i for short, is implemented for Wi-Fi Protected Access

15)Evil Twin Access point used in security, is a wireless access point that act as a legal Wi-Fi access point so that an attacker can gather personal information without the end-user's knowledge.and Wardriving is the act of searching for Wi-Fi wireless networks by a person in a moving vehicle, using a portable computer, mobile or tablet etc

16)MTSO, GSM, LTE, CDMA are channel access methods which are used by various radio communication technologies. It is a form of multiplexing, which allows numerous signals to occupy a single transmission channel, and minimizing the use of available bandwidth.

17)CSMA/CA + ACK, hertz, 2.4 GHz, 5 GHz are a set of rules determining how network devices respond when two devices attempt to use a data channel at a time. Ethernet networks use CSMA/CA + ACK, hertz, 2.4 GHz, 5 GHz etc to physically monitor the traffic on the line at participating stations. If no transmission is taking place at the time, the particular station can transmit and if two stations attempt to transmit simultaneously, this causes a collision, which is detected by all participating stations.

18)DNS: TCP/IP networks communicate with hosts using their IP addresses. It would be very difficult for someone to have to remeber the different IP addresses for the hosts they want to connect to on the network. A Domain Name Service makes it easier to identify a host by a domain name. A domain name uses words rather than numbers to identify Internet hosts.

NAT:NAT translates one IP address to another and that address can be a source address or a destination address. NAT can be used as both static and dynamic.DHCP is used for providing IP address automatically to client
computer through DHCP server and also configure clients with optional values like default gateway,dns server address.

19)The elements of an SNMP network management system are mainly four they are SNMP Manager,Managed devices,SNMP agent and Management Information Database Otherwise called as Management Information Base.

20)

A LAN is a group of computers and network devices connected together, usually within the same building. By definition, the connections must be high speed and relatively inexpensive.A LAN connection is a high-speed connection to a LAN.

A MAN is a larger network that usually spans several buildings in the same city or town.

A WAN in comparison to a MAN, is not restricted to a location, although it might be confined within the bounds of a state or country. A WAN connects several LANs, and may be limited to an enterprise.The technology is high speed and relatively expensive.