Ports 1 to 1023 4. Identify the port numbers for the following applications a. Telnet 23 b. HTTP 80 c. FTP 20, 21 d. DNS 53 e. DHCP 67, 68 5. Define the purpose of a connection oriented protocol. Give an example. It establishes the network connection, manages the data transfer, and terminates the connection.
2. Determine the protocol numbers for the protocol names: Protocol | NUMBERS | References | IPv4 (Internet Protocol version 4) | 4 | (Protocol Numbers, 2013) | IPv6 (Internet Protocol version 6) | 41 | | TCP (Transmission Control Protocol) | 6 | | UDP (User Datagram Protocol) | 17 | | ICMP (Internet Control Message Protocol) | 1 | | VRRP (Virtual Router Redundancy Protocol) | 112 | | IPSEC ESP (Internet Protocol Encap Security Payload | 50 | | L2TP (Layer Two Tunneling Protocol) | 115 | | OSPF (Open Shortest Path First) | 89 | | EIGRP (Enhanced Interior Gateway Routing Protocol) | 88 | | 3. Determine the correct ICMP type based on the description provided. ICMP Message Description | Type | Code | Echo | 8 | RFC792 | Echo Reply | 0 | RFC792 | Time Exceeded | 11 | 0 – Time to Live exceeded in Transit1 - Fragment Reassembly Time Exceeded | Port Unreachable | 3 | 3 - Port Unreachable | Fragmentation Needed | 3 | 4 - Fragmentation Needed and Don't Fragment was Set | 4. What are the valid ranges of protocol numbers?
4 | 12 | 16 | 4,094 | 11111111.11111111.11110000.00000000255.255.240.0 | /20 | x.y.N*16.0 | 12) Explain the reasoning behind the concepts of “subnet zero”? Subnet Zero If a network address is subnetted, the first subnet obtained after subnetting the network address is called subnet zero. Consider a Class B address, 172.16.0.0. By default the Class B address 172.16.0.0 has 16 bits reserved for representing the host portion, thus allowing 65534 (216-2) valid host addresses. If network 172.16.0.0/16 is subnetted by borrowing three bits from the host portion, eight (23) subnets are obtained.
Retrieved April 1, 2003, from http://www.computerworld.com/securitytopics/security/story/0,10801,79083,00.html?OpenDocument&~f Neiderhoffer, M. (2002, August). Internet security and the CPA. In P. Warner, L. Smith, (Eds. ), The CPA Journal. 72(8), 71-72.
Dedicated digital circuits 3. c. Routers use Layer 3 and ignore Layers 1 and 2. d. Routers discard old data-link headers and insert new data-link headers as part of their logic, which treats each interface’s lower-layer details as independent from each other. 4. b. As a transport service to deliver IP packets to the next IP router 5. b. Star 6. c. 64 Kbps, 1.544 Mbps, and any speed in between d. No literal distance limitation 7. a. A patch cable with RJ-48 8. c. The switches map the T1 customer lines to one of 28 different frequencies in the T3 trunks.
NT1210 Unit 2 Assignment Key Terms for Chapter 2 Computer Networking Computer Network - A computer network or data network is a telecommunications network that allows computers to exchange data. Application - is a program or group of programs designed for end users. Email - messages distributed by electronic means from one computer user to one or more recipients via a network. Voice Call – Call of VOIP Video Frame – In North America 30 frames per second (fps) is the broadcast standard. Web Server - is a program that, using the client/server model and the World Wide Web's Hypertext Transfer Protocol ( HTTP), serves the files that form Web pages to Web users (whose computers contain HTTP clients that forward their requests).
Question 43: What is the administrative distance of Routing Information Protocol (RIP) routing protocol? Question 44: Which of the following is a common OSI Layer 3 (network layer) troubleshooting issue? (Choose 2) Question 45: Look at the topology shown below. What is the design issue with this wireless network? Question 46: Consider the network diagram presented below, let’s assume that both switches are capable of auto negotiating Ethernet speeds of 10, 100, and 1000 Mbps.
Unit 3 Assignment 1 IPV6 Addressing 1. Research the following organizations and explain their involvement with the internet public IP addresses. * American Registry for internet Numbers (ARIN) IP address space allocation & transfer and record maintenance. Directories Registration transaction information (WHOIS) Routing information DNS (Reverse) * Internet Assigned Numbers Authority (IANA) IANA coordinates the global pool of IP and AS numbers. It provides the Regional Internet Registries.
IPv6 was developed by the Internet Engineering Task Force (IETF) to deal with the long-anticipated problem of IPv4 address exhaustion. IPv6 is intended to replace IPv4, which still carries the vast majority of Internet traffic as of 2013. As of late November 2012, IPv6 traffic share was reported to be approaching 1% (Wikipedia, 2013). On the Internet, data is transmitted in the form of network packets. IPv6 specifies a new packet format, designed to minimize packet header processing by routers.
3. Which of the following is the application layer protocol used for all communications between Internet Storage Name Service clients and servers? b. iSNSP 4. Which of the following is not true in reference to converting a basic disk to a dynamic disk? b.