Examples of application layer protocols

Assignment Help Computer Networking
Reference no: EM13753241

Question 1. This layer is responsible for the physical medium (wired , wireless, copper, fiber, etc...).

Data Link Layer

Transport Layer

Physical Layer

Network Layer

Question 2. While the job of the link layer is to move entire frames from one network element to another, The job of the physical layer is to do what?

Move physical things

Move the individual bits of the frame from one node to the next.

Accept protocol ununciations.

Identification of Choices

Question 3. Cables and wireless transmissions are part of what OSI layer?

Persistance

Network

The Physical layer

The Application layer

Question 4. The term ______________ refers to high speed communication circuits such as DSL.

protocol stack

broadband communications

monopoly

print server

Question 5. Which of the following is not true about de facto standards in the communications industry?

They never evolve into formal standards

They are those standards that emerge in the marketplace

They are generally supported by more than one vendor but de facto standards have no official standing

They tend to emerge based upon the needs/responses of the marketplace

Question 6. There are at least 4 types of delay which include ___ , ____ , ____ , and ____.

Processing delay, Queuing delay, Transmission delay, and Propagation delay.

cluster services , data access, machine code, triangulation.

data access logic , enumaration, interrogation, processing.

simulation

Question 7. What are the three types of application architectures?

Hostess, smtp, pop

Internet , Access Protocol , X.25

Host based architecture, client-based architecture, and client-server architecture.

X.400

Question 8. The interface that a process uses to send and receive messages from the network is called a _________.

Socket

response address, response header

response header

response address

Question 9. Examples of application layer protocols include:

IP

SMTP, Telnet, HTTP, FTP

five

n

Question 10. In A ____ Architecture, there is minimal reliance (or no reliance) on dedicated servers?

client-server

host-based

peer-to-peer

client-based.

Reference no: EM13753241

Questions Cloud

Determine the amount and the character of recognized gain : Copper Industries (a sole proprietorship) sold three § 1231 assets during 2014.  Determine the amount and the character of the recognized gain or loss from the disposition of each asset. Assuming that Copper has $6,000 no recaptured net § 1231 losses..
What similarities between what japanese and germans believed : What do you believe these historians meant by totalitarianism? What are the similarities between what the Japanese, Germans, and Soviets believed? What are the differences?
What should jingie do based upon these facts : Jingie owns two parcels of business land (§ 1231 assets). One parcel can be sold at a loss of $60,000, and the other parcel can be sold at a gain of $70,000. Jingie has no nonrecaptured § 1231 losses from prior years.
Determine cost of the timber sold related to depletion : Moosehead timber company owns 10,000 acres of timberland purchased in 2011 at a cost of $1,500 per acre. At the time of purchase, the land without the timber was valued at $500 per acre. In 2012, Moosehead built fire lanes and roads, with a life of 3..
Examples of application layer protocols : Examples of application layer protocols and Cables and wireless transmissions are part of what OSI layer
Nformation security implementation plan : The paper will be an information security implementation plan that addresses: physical security, authentication, network security, encryption, software development, email, Internet, acceptable use, disaster recover, business continuity security aw..
Expected level of sales for the year : Griswold Electronics expects sales next year to be $3,000,000 if the economy is strong, $1,200,000 if the economy is steady, and $800,000 if the economy is weak. The Griswold's are predicting a 35% probability the economy will be strong, a 50% pro..
Provide specific details from the sargent family painting : Provide specific details from The Sargent family painting or personal diaries and clearly explain how these specific details illustrate your points.
The origin and history of the sip protocol : Explain, in a couple of paragraphs, the origin and history of the SIP protocol and the H.323 protocol suite. What are the most noticeable characteristics of each. What are some of their cons

Reviews

Write a Review

Computer Networking Questions & Answers

  Find laptop models which have internal networking capability

Many desktop computers and laptop computers now include automatic built-in network connectivity. Find and name specific desktop and laptop models which have internal networking capability.

  How linked-state protocol routing works

Question 1: How do routing protocols work? Question 2: What are 2 examples of linked-state routing protocols?

  Under what circumstances would using strict source routing

Source routing (2010) defines strict source routing as specifying "the exact route that the packet must take".Strict source routing is almost never used; under what circumstances would using strict source routing actually be beneficial and why?

  Explain system gives protection using bell-lapadula policy

A computer system provides protection using the Bell-LaPadula policy. How would a virus spread if: The virus were placed on the system at system low (the compartment that all other compartments dominate)?

  Creating and implementing a cloud computing policy

Question: Creating and Implementing a Cloud Computing Policy

  How many subnets are created

What are the current advantages and disadvantages of packet-switching compared to circuit switching?

  Demonstrate with a high degree of confidence that errors

The goal of testing is to demonstrate that the software satisfies its requirements and to demonstrate with a high degree of confidence that errors, which could lead to unacceptable failure condition, have been removed.

  Identifying potential malicious attacks threats and

identifying potential malicious attacks threats and vulnerabilitiesyou have just been hired as an information security

  Develop server-side dynamic webpages

A company is warned by its credit card companies that it will be classified as a high-risk firm unless it immediately reduces the number of fraudulent purchases made by its e-commerce clients. Come up with a plan to avoid this outcome.

  Explain nefarious computer activities

Write a short description of what they are and include your assessment of whether this activity is something to worry about or not.

  Text book – computer networking a top down approach

Text Book – Computer networking A top down approach, Part 1. Text reading, Part 2. Textbook questions, Chapter 7 , 7.1 Generalize the basic approaches we used for making the best out of best effort service for real-time interactive multimedia applica..

  Find which domain name is available for company

Suppose the role of the IT consultant to new nonprofit organization, Free Flu, which provides flu shots to elderly. Organization requires a domain name. Use Internet resources to find out which domain name is available to company.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd