1. How many hosts can reside on a single Class C network?
1. |
65535 |
|
2. |
256 |
|
3. |
254 |
|
4. |
127 |
2.
Select the invalid IP address
1. |
95.31.0.15 |
|
2. |
143.256.11.2 |
|
3. |
24.123.33.60 |
|
4. |
135.10.243.1 |
3.
What layer in the TCP/IP protocol suite would a Web Browser reside?
1. |
Data Link |
|
2. |
Application |
|
3. |
Network |
|
4. |
Physical |
4.
If I have developed a new type of network interface device - one that uses a new wireless technology, which layer of the TCP/IP protocol suite would I need to modify to support it?
1. |
IP |
|
2. |
Application |
|
3. |
TCP |
|
4. |
Data Link |
5.
What is the name of the service that converts something like www.myinternetsite.com to the IP address of the computer?
1. |
Address Resolution Protocol |
|
2. |
Reverse Address Resolution Protocol |
|
3. |
Domain Name Service |
|
4. |
Router |
ANSWERS
QUESTION 1. 254
QUESTION 2. 143.256.11.2
QUESTION 3. Application
QUESTION 4. Data Link
Explanation
1. 2^8 - 2 = 256 - 2 = 254
2. Range for each number is 0-255 since there are only 8 bits. So,
256 is an invalid entry
3. Web browser is an application to view only. So, it is under
Application layer
4. Data link since it makes the link contact
-- 4 sub parts at a time please - Policy of Chegg
1. How many hosts can reside on a single Class C network? 1. 65535 2. 256...
Question 1 The size of the datagram is determined by the application that sends the data. Allowing the size of datagrams to vary makes IP adaptable to a variety of applications. True False Question 2 What is the conceptual network boundary, and where is it located within the protocol stack? Is the transition area between digital and analog signals and can be found between layer 2 and layer 3 of the protocol stack. Identifies application direct messaging and is formed...
1) Transport services and protocols provide ____________ between ____________ running on different hosts 2) Multiplexing (at the sender)? 3) What does a host use to direct segment to appropriate socket? 4) Too many sources send too much data too fast for network to handle; this situation can lead to ____? 5) Given 20 bytes if IP header, 20 bytes of TCP header, 20 bytes of link-layer header. Suppose an application generates chunks of 20 bytes of data every 20 millisecond....
1. Define and discuss the functions of the following terms/protocols in relation to the internet. 1) TCP/IP 2) HTTP 3) URL 4) DNS 5) FTP 2. Describe the function of each layer in the four Layer network model. 1) Application Layer 2) Transport Layer 3) Internet Layer 4) Link Layer 3. Discuss how requests are Handled in the client-Server model. 4. In the Domain Name System (DNS), what is address resolution and how is it achieved? (answer all please. thanks)
1.In the TCP/IP protocol suite, the ______ layer is responsible for moving frames from one hop (node) to the next.Immersive Reader (10 Points) network data link transport physical 2.As frequency increases, the period ________.Immersive Reader (10 Points) increases none of the choices are correct decreases remains the same 3.Data can flow only in both direction all of the times in a _________ mode.Immersive Reader (10 Points) none of the choices are correct half-duplex simplex full-duplex 4.For a ______ channel, the...
1) In a typical TCP connection establishment, the two flags used in the core handshake are the _____ and _____ flags. 2) TCP uses _____ to manage the transmission between senders and receivers that can send or receive differing rates to make sure not to overwhelm machines that may be slower. 3) The transport layer protocol used by the TCP / IP suite that does not provide guarantees on ordering or confirmation of receipt of packets is called . 4)...
seven-layer model? (Select twa.) A. Cables B. Hub C. Network protocol D. Session software the data 13. Which components work at Layer I of the os La a. Which layer of the 0Sl model makes sure ls in a readable format for the Application layer A. Application layer B. Presentation layer Ex do C. Session layer D. Transport layer 9. At which layer of the TCP/1P model are UDP 14. Andalyn says complete 48-bit MAC ed to NIC manufacturers from...
1. Which of the following protocols is used by a client to send an email message? a. HTTP SMTP b. FTP d. RDP 2. What is the most common network topology today? a/Star c. Hub Ring d. Mesh 3. A client/server network is the simplest network model. a/ True O False 4. Which client server application allows an administrator to control a remote computer, but does not encrypt or secure the communication between client and server? A Telnet C. Remote...
QUESTION 1 Which generation of wireless network technology uses the packet-switched IP network? a. 3G b. 4G c. 5G d. All of the above 2.5 points QUESTION 2 Which layer of the TCP/IP hierarchy is responsible for obtaining the correct address for a message’s destination? a. Application b. Link c. Network d. Transport 2.5 points QUESTION 3 The UPDATE statement is used to update table names. True False 2.5 points QUESTION 4 Which of the following is...
(a) Describe briefly the packetizing services provided by network-layer of the TCP/IP (3 marks) (b) Describe briefly the multiplexing services provided by the network-layer of the protocol suite. TCP/IP protocol suite. How can the multiplexed TCP and UDP packets be (4 marks) (c) Describe briefly the impact of congestion on packet delay and throughput. Describe (6 marks) (d) Fig. Q1 shows a network adopting the virtual-circuit approach to transmit demultiplexed at the destination? the strategy used in the Internet to...
- Network security QUESTION 17 We assume that a LAN network includes 7 hosts (A, B, C, D, E. Fand G) which are connected by a switch. The contents of the switch's CAM table is as follows: (Port 1. Host A) - (Port 2. Host B) - (Port 3. Host - Port 4, Host D) - Port S. Hosta-Port 6, Host F) - (Port 7. HostG), Also, we assume that there is/are one or many host(s) that has/have sent fake...