name 5 network protocol with their applications, find their RFC with searching on internet ( if there are multiple RFC for one protocol, write the oldest one).
Following are 5 network protocols with their applications and RFCs.
1.
ARP
Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address (IP address) to a physical machine address that is recognized in the local network.
RFC 826
An Ethernet Address Resolution Protocol or Converting Network Protocol Addresses
2.
ICMP
ICMP (Internet Control Message Protocol) is an error-reporting protocol network devices like routers use to generate error messages to the source IP address when network problems prevent delivery of IP packets.
RFC 777
Internet Control Message Protocol
3.
TCP
TCP (Transmission Control Protocol) is a standard that defines how to establish and maintain a network conversation via which application programs can exchange data. TCP works with the Internet Protocol (IP), which defines how computers send packets of data to each other. TCP is a connection-oriented protocol, which means a connection is established and maintained until the application programs at each end have finished exchanging messages. It determines how to break application data into packets that networks can deliver, sends packets to and accepts packets from the network layer, manages flow control, and—because it is meant to provide error-free data transmission—handles retransmission of dropped or garbled packets as well as acknowledgement of all packets that arrive.
RFC 793
TRANSMISSION CONTROL PROTOCOL
4.
SMTP
SMTP (Simple Mail Transfer Protocol) is an application layer protocol. The client who wants to send the mail opens a TCP connection to the SMTP server and then sends the mail across the connection. The SMTP server is always on listening mode. As soon as it listens for a TCP connection from any client, the SMTP process initiates a connection on that port (25). After successfully establishing the TCP connection the client process sends the mail instantly.
RFC 821
SIMPLE MAIL TRANSFER PROTOCOL
5.
HTTP
HTTP (Hypertext Transfer Protocol) is the set of rules for transferring files (text, graphic images, sound, video, and other multimedia files) on the World Wide Web. As soon as a Web user opens their Web browser, the user is indirectly making use of HTTP. HTTP is an application protocol that runs on top of the TCP/IP suite of protocols (the foundation protocols for the Internet).
RFC 2068
Hypertext Transfer Protocol -- HTTP/1.1
name 5 network protocol with their applications, find their RFC with searching on internet ( if...
Describe how to use applications and communication protocols in the Transmission Control Protocol/ Internet Protocol (TCP/ IP) suite to design IP addressing and subnetting solutions for variable length subnet masks in your small home network.
IPsec is an extension of the Internet Protocol (IP) and is designed to secure the network communication through cryptography. Hence, IPSec can only be implemented at the Network Layer. True or False?
How is independence from underlying network technologies achieved in the Internet protocol stack?
Which iSCSI initiator automatically discovers available targets on the IP network? iSNS (internet Storage Name Service) SendTargets discovery SLP (Service Location Protocol) DNS (doman name service)
Subject: Network Security 2. Secure Socket Layer protocol (SSL): (a) Compare the Secure Socket Layer protocol (SSL) to IPsec. Show where would you place both in the Internet protocol stack. Which one is better suited for credit card transactions? [10 marks] (b) Is a man-in-the-middle attack possible on the Secure Socket Layer protocol (SSL)? [10 marks] (c) What is the difference between session and connection and why do we need both? [5 marks]
5. Mobile IP is an important standard for supporting mobility in the Internet. When a new network, name a couple methods it can use to discover which agents it needs to register with? node moves to lost packets usually is not feasible in real-time conversational applications suc 6. Voice-over-IP (VolP). Name a couple solutions adopted by VolP to help overcome this problem preserve acceptable audio quality? 5. Mobile IP is an important standard for supporting mobility in the Internet. When...
. Name the layer of the Web/Internet Protocol Stack with which each of these functions is associated. a. Encrypt a message. b. Prevent buffer overruns. c. Choose the best route for a data packet. d. Compose an email message.
Suppose, a network of 5 nodes uses RAFT consensus protocol. The state of the node logs is as follows: N1: 1.1, 3.1, 3.2 N2: 1.1, 2.1 N3: 1.1 N4: 1.1, 3.1 N5: 1.1, 1.2 Where 1.2 represents the 2nd log from the 1st term. The system is searching for a new leader. Is there any chance that the transaction of 1.2 committed in future? A)Yes irrespective of any node as the leader B)Yes if N5 becomes the next leader C)...
DHCP (Dynamic Host Configuration Protocol) is used for automatic configuration of a network interface. Such a configuration includes several parts. Consider the case when a computer is connected to an IP subnet where there is a DHCP server. Which of the following configuration items are provided through DHCP? The name of the outgoing mail server. The IP address to the router which connects the subnet to the rest of the Internet. Information about what addresses that are included in the...
Applications Name Rank Program Network 2 + (000) NBC Sunday Night Footbal 20,812 NBC CBS CBS CBS FOX CBS CBS NBC АВС CBS CBS NBC CBS NBC 2 The Big Bang Theory 3 NCIS NCIS: New Orleans Empire 19,053 18,257 17.421 17.333 17,087 5 6 CBS +NFLN Thursday Night Football 7The Big Bang Theory - 2 8 Sunday Night NFL Pre-Kickoff 9 Dancing With the Stars Madam Secretary 15,842 15,577 14,727 14.168 14,111 13,802 3,778 9 10 11 Criminal Minds...