Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem1) Which of the following protocols are exs of TCP/IP transport layer protocols?

a. Ethernet
b. HTTP
c. IP
d. UDP
e. SMTP
f. TCP

problem2) Which of the following protocols are exs of TCP/IP network access layer protocols?

a. Ethernet
b. HTTP
c. IP
d. UDP
e. SMTP
f. TCP
g. PPP

problem3) The process of HTTP asking TCP to send some data and make sure that it is received correctly is an ex of what?

a. Same-layer interaction
b. Adjacent-layer interaction
c. The OSI model
d. All the other answers are correct.

problem4) The process of TCP on one computer marking a segment as segment 1, and the receiving computer then acknowledging the receipt of segment 1, is an ex of what?

a. Data encapsulation
b. Same-layer interaction
c. Adjacent-layer interaction
d. The OSI model
e. None of these answers are correct.

Qustion5) The process of a web server adding a TCP header to a web page, followed by adding an IP header, and then a data link header and trailer is an ex of what?

a. Data encapsulation
b. Same-layer interaction
c. The OSI model
d. All of these answers are correct.

problem6) Which of the following terms is used specifically to identify the entity that is created when encapsulating data inside data link layer headers and trailers?

a. Data
b. Chunk
c. Segment
d. Frame
e. Packet
f. None of these—there is no encapsulation by the data link layer.

problem7) Which OSI layer defines the functions of logical network-wide addressing and routing?

a. Layer 1
b. Layer 2
c. Layer 3
d. Layer 4
e. Layer 5
f. Layer 6
g. Layer 7

problem8) Which OSI layer defines standards for cabling and connectors?

a. Layer 1
b. Layer 2
c. Layer 3
d. Layer 4
e. Layer 5
f. Layer 6
g. Layer 7

problem9) Which OSI layer defines standards for data formats and encryption?

a. Layer 1
b. Layer 2
c. Layer 3
d. Layer 4
e. Layer 5
f. Layer 6
g. Layer 7

problem10) Which of the following terms are not valid terms for the names of the seven OSI layers?

a. Application
b. Data link
c. Transmission
d. Presentation
e. Internet
f. Session

Fill In The Blanks:

1. Number of links to connect n nodes in a mesh topology is = _______.

2. Mesh Topology is _______ flexible and has a ________ expandability

3. In BUS topology, at each end of the bus is a ____________, which absorbs any signal, removing it from the bus. 

4. In BUS topology, One could easily add any new node or delete any node with-out affecting other nodes; this makes this topology easily _____________. 

5. _________ and ______________ would force a maximum length of shared medium which could be used in BUS topology. 

6. The two alternatives for the operation of the central node in STAR topology are: __________ and ___________. 

7. In Ring Topology, the links are _____________; that is, data are transmitted in __________ direction only and all are oriented in a same way

8. In Ring Topology, Repeater works in 3 modes: ____________, _____________ and ______________.

9. ___________ topology could be considered as an extension to BUS topology.

10. ______________ is appropriate for use in star and ring topologies

11. Coaxial cable is appropriate for use in __________ topology.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M93001
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question? 


Related Questions in Computer Network & Security

Or the purpose of the first part of this project you are

Or the purpose of the first part of this Project, you are still the InfoSec Specialist for the Greenwood Company. Consider this project a continuation of the work you performed in Projects 1 and 2. After seeing you searc ...

Assignmentwan technologies paper research point-to-point

Assignment WAN Technologies Paper: Research Point-to-Point (dedicated), Packet Switched, and Circuit Switched WAN protocols/circuits/types. Define each protocol and describe at least two data transmission technologies as ...

Assignmentthis assignment requires you to use presentation

Assignment This assignment requires you to use presentation tools and allows you to be creative. The presentation subject is to be network security on the Boeing 787 Dreamliner. To begin, get familiar with the topic by r ...

Assignmentyou have been tasked with reconfiguring the

Assignment You have been tasked with reconfiguring the network for your company, which has grown considerably over the past year. You have used only static routing in the past, but you do not wish to spend the administra ...

Questions1 describe three factors that help to influence

Questions: 1. Describe three factors that help to influence our nation's focus on natural or man-made disasters. 2. What issues have been raised concerning some of the authorities granted to government agencies in the PA ...

There are a number of cellular phone companies each serving

There are a number of cellular phone companies each serving their own unique geographical areas. Likewise, they each may use a different technology to transfer communication. Research the pros and cons 3G and 4G technolo ...

Objectivesthis assignment is designed to assess students

OBJECTIVES This assignment is designed to assess students' ability to: - Produce a concise detailed report about the importance of information security audit policy and its components - To have excellent understanding re ...

Term paper planning an it infrastructure audit for

Term Paper: Planning an IT Infrastructure Audit for Compliance Note: Chapter 5 of the required textbook may be helpful in the completion of the assignment. The audit planning process directly affects the quality of the o ...

Explain the key differences between symmetric and

Explain the key differences between symmetric and asymmetric encryption. Which can the computer process faster? Which lowers the costs associated with key management? What is a VPN? Why are VPNs widely used?

Networking trendsnetworking trends paper in this paper you

Networking trends. Networking Trends Paper: In this paper, you will research and report on network design and management trends over the last three years (present year minus 2) in the areas of virtualization, security, h ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen