OSI And TCP-IP Models

Assignment Help Basic Computer Science
Reference no: EM132671747

Discussion Topic

Choose a TCP/IP service, such as a web browser, email, file transfer, remote shell, DHCP, DNS, network time protocol, network address translation, etc.

Important

Everyone should pick a different service, if possible, to keep the discussion fresh.

In your original post, answer the following about the service you have chosen:

How would you determine the IP addresses of your devices on your network?

Success Hints

You can use ipconfig if you use the command line.

You can use whatismyipaddress.com if you have connectivity on your devices.

Using Google, determine how to look up your IP address in the Windows 10 GUI.

How would you determine if your devices are able to communicate on your network?

Success Hint

You can use ping on your computers. How would you do it on your mobile devices?)

Using ipconfig, how do you determine the IP address of your home router?

Trace a request and a response with the help of a diagram of the TCP/IP service that you chose.

Follow the request and response through each of the TCP/IP layers.

Describe what happens at each layer of the OSI and TCP/IP reference models.

Reference no: EM132671747

Questions Cloud

Additional network controls to protect their growing network : Due to the Always Fresh expansion, management wants additional network controls to protect their growing network.
Integrating blockchain apps with legacy applications : the author introduces issues to address when integrating blockchain apps with legacy applications.
Disaster recovery and business continuity plan : Research and select an organization that effectively implement the disaster recovery and business continuity plan.
Attractive for modeling efforts : Excel is probably the most popular spreadsheet software for PCs. Why? What can we do with this package that makes it so attractive for modeling efforts?
OSI And TCP-IP Models : how do you determine the IP address of your home router? Follow the request and response through each of the TCP/IP layers.
Crimes driven changes in information technology security : How have computer crimes driven changes in information technology security? How does the Fourth Amendment apply to computer crimes?
Vehicle Insurance Management System : System Design Specifications (including System Architectural [Layered, "Physical"] Design Scheme selected; Package Diagram
Explicit strategies for technology development : Do you feel that countries and companies need explicit strategies for technology development,
Product appears as advertisement in social media : You may have noticed that when you look at products on a search engine, that same product appears as an advertisement in your social media and other sites

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Prove that a cryptosystem

Prove that a cryptosystem has perfect secrecy if and only if H(P|C) = H(P).

  We are given a directed graph on n vertices

Design a o(n3) algorithm (note that this is little-o) that counts the number of triples (v1, v2, v3) such that v1v2, v2v3, v3v1 are all edges.

  Describe a master slave flip-flop

(Hardware Description Languages) Describe a master-slave flip-flop with its ones-catching problem as a Verilog module. Do not use gates but only behavioral constructs.

  Farmer raises the butterfat content

If a farmer raises the butterfat content 0.3%, how much, in dollars, extra will he earn on 10,000 gallons?

  Erin Andrews invasion of privacy case

Please do an internet search and find out the results of the Erin Andrews invasion of privacy case that the Craig discusses in the assigned text.

  Calculate the number of ftes

Calculate the number of FTEs that you will need to hire to cover the additional workload. Base your calculation on 7.5-hour workday.

  Write a function which passes in two reference parameters

The function will double the value of these two parameters and pass back the new value. The function header is given below

  What is the hit ratio taking in to consideration the write

What is the hit ratio taking in to consideration the write cycle?

  Discuss the points and tabulate the strengths and weakness

Please discuss the points and tabulate the strengths and weaknesses

  Clustering algorithm

Discuss 5 clustering algorithms. Compare and contrast them to one another and use real-world examples (one for each clustering algorithm).

  Write a letter of interest to a prospective employer listing

Look up a job that you want to have after college, write a letter of interest to a prospective employer listing: Who you are?What skills you have that are relevant for this job?Why you are interested in the job?

  Define logical operational model-physical operational model

Define Logical Operational Model and Physical Operational Model in your own words.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd