Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Network Protocols Unit 6, Assignment 5 1. The rules and procedures for communica

ID: 3837400 • Letter: N

Question

Network Protocols

Unit 6, Assignment 5

1. The rules and procedures for communication and behavior are known as:

2. TCP/IP is known as a protocol _______________

3.           (Choose True or false) In reference to a DHCP server assigning IP addresses, when a computer is moved it is not easy for the DHCP server to assign it a new IP configuration

4.            What is the most common protocol stack (Layered Architecture) known as?

5.            Which protocol is the standard protocol for sending email over the Internet?

6.            If a network manager wants to monitor network devices and gather statistics within a network in a building, which protocol should he/she use?

7.            A _________server, upon a request, will automatically assign IP address to the requesting device.

8.            The Internetwork layer has several main tasks. List two of the tasks.

9.           The _______ software allows a user to use a computer’s name instead of using its IP address.

10.         In the DNS, what is the purpose of a resolver cache?

11.          What does the Transport-layer do with data it receives from the Internetwork protocol?

12.          In reference to TCP/IP’s Layered Architecture, what layer does the NIC operate at?

13.          In reference to TCP/IP’s Layered Architecture which layer provides network services to user applications that access network resources

14.          Name two features of TCP that show why it is a protocol generating reliable data transfer.

15.          What is a purpose of Flow control?

16.          What type of protocol does the Ping program use to request a response from another computer to verify whether it is available for communication

17.          IP addresses are assigned to every computer in a network and they are used for two main purposes. What are the two main purposes?

18.          How does a router determine the past path when data is being sent across the Internet?

19.          (Choose true or false) IPv6 has larger address space and extensibility but not any more support for mobility than IPv4 has.

20.          Name two of the improvements of IPv6 over IPv4.

21.          When data is being transferred from a source to a destination within a network, when a source doesn’t have the destinations MAC address in order to deliver the data to the correct PC, what does it do?

22.          When a packet is being delivered across several states from its destination to its source, what is the name of the hardware which determines (routes) where the packet should go next to get to its destination

23.          In reference to their roles in the Transport Layer, contrast the Transmission Control protocol and the User Datagram protocol.

24.          Which protocol is used to secure sensitive network transmissions between computers needing extra security. Also, how is security provided?

25.          The most common protocol used in network transference of data is known as?

Part 4 - Additional Questions

Please complete the following questions. (1 point each)

When a set of protocols work together cooperatively it is known as a ____________________.

Which of the following is used by TCP and UDP to specify the source and destination Application-layer protocols?

•Segment numbers

•Window size headers

•Port numbers

•IP addresses

Explanation / Answer

1. The rules and procedures for communication and behavior are known as communication protocol.

2. TCP/IP is known as a protocol suite.

3.

Statement : In reference to a DHCP server assigning IP addresses, when a computer is moved it is not easy for the DHCP server to assign it a new IP configuration.

The above statement is false.

Reason :

Since DHCP server generates the ip addresses dynamically and fastly,  assigning IP addresses, when a computer is moved is easy.

4. The most common protocol stack (Layered Architecture) known as OSI Reference Model.

5. Simple Mail Transfer Protocol (SMTP) protocol is the standard protocol for sending email over the Internet.

6. If a network manager wants to monitor network devices and gather statistics within a network in a building, Simple Network Monitoring Protocol (SNMP) is used.

7. A DHCP server, upon a request, will automatically assign IP address to the requesting device.

8. Two major tasks of Internetwork layer :

Two major tasks of Internetwork layer is

9. WINS client software allows a user to use a computer’s name instead of using its IP address.

10. Purpose of a DNS resolver cache :

The main purpose of a DNS resolver cache is a temporary database, maintained by a computer's operating system, that contains records of all the recent visits and attempted visits to websites and other internet domains.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote