What rfc describes the gopher protocol

Assignment Help Computer Networking
Reference no: EM13192508

Project 1

• In your own words, what RFC gives the protocol and specifications a news server must use to access the UseNet network? Print and read the first two pages of the RFC.

• In your own words, what RFC describes the Gopher protocol? Print and read the first two pages of the RFC.

• List and illustrate 5 RFCs that describe the IMAP protocol. Print and read the first two pages of one of these RFCs.

Project 2

Use the web site serverwatch and other sites linked to this site to research the following information:
a. List two examples of e-mail server software other than those mentioned in class. List three to six features of each software package and include the web site of the software manufacturer.
b. Find an FTP server product that can run on a Windows XP or Windows Vista or Windows 7 PC requiring few system resources and can be used by a small business to distribute software upgrades and patches.
c. Give three examples of news servers that can access UseNet listing the features of each. Include the price and the manufacturer's web site.

Project 3

If your ISP supports newsgroups, research these newsgroups to find one that is focused on understanding and using the Internet. What relevant newsgroups do you find? Subscribe to one of these newsgroups for a few days. Print and read one article from the newsgroup and summarize it for the purpose of this assignment.

Project 4

What are the four possible data-to-signal conversion combinations and in few words discuss each one of them?

Project 5

What happens when you introduce noise into digital data and digital signals?

Project 6

What is the purpose of using digital encoding schemes?

Project 7

What are the main characteristics of the multiplexed Earth station satellite topology?

Project 8

a. As a consultant for the First National Bank of Monroe, you have been asked to solve a problem on the bank's network that began on Monday. According to the bank manager, at the beginning of each day two of the 16 tellers have been unable to log on to the network. Two other tellers occasionally experience problems at the beginning of the day, but not if they get to work before everyone else. They receive an error that says something like "another machine is using that name". When you arrive at the bank, the college intern who has been setting up the machines tells you that he is using a program called Ghost to clone all PCs from a single disk image. In other words, an exact copy of one machine's software, operating system, and its properties has been copied to all of the computers. All of the PCs are brand new are running Windows 7, and use the same hardware and software. First National Bank's network consists of two Windows 2008 servers and runs both TCP/IP and NetBIOS/NetBEUI protocols. It uses DHCP to allocate TCP/IP addresses. What might be preventing the two tellers from logging on to the network in the morning?

b. First National Bank's president congratulates you on quickly solving the problem. She then shares the information that she's about to make an offer to buy Monroe other bank, Metropolitan Savings. She's worried that the two banks' networks won't integrate easily. She isn't sure what kinds of severs or workstations are used by the other bank, but Metropolitan Savings' manager mentioned something about a network that relies on the Internet. What can you tell her about integrating the two systems? What protocols would you recommend that she use or continue to use to facilitate the integration process?

c. Six months later, First National Bank has successfully consolidated the networks at its original location and at its new acquisition. Business is booming, and the bank is investigating the possibility of allowing customers to check their account balances from the Web. However, the bank's president tells you the bank doesn't have its own connection to the Internet at this time. She understands that she needs to obtain IP addresses for all of her machines. But, she says, they are already using IP addresses internally and they work well without having to pay ICANN for new IP addresses.

Would you recommend leaving the bank's IP addressing as is or changing it? How do you suggest that the bank obtain Internet access? What concerns would you bring up with regard to allowing customers access to their account information off the Web? How might Internet access affect the ban's internal LAN?

Reference no: EM13192508

Questions Cloud

The first american political parties emerged from conflict : The first American political parties emerged from the conflict between:
Explain sample of a diprotic acid is titrated : A 30.0 mL sample of a diprotic acid is titrated with 0.255 M KOH. If 59.5 mL of base is required to reach the second equivalence point
Find the height of the trapezoid : trapezoid has an area of 80.75 sq. in., and its two bases are 7 and 12 inches long. find the height of the trapezoid.
Calculate the elasticity of demand for alcohol consumption : Two economists took a close look at a broad survey of more than 50,000 persons each year from 1987 to 1999. They found that drinkers do reduce their consumption substantially in economic downturns.
What rfc describes the gopher protocol : What RFC describes the Gopher protocol? Print and read the first two pages of the RFC and list and illustrate 5 RFCs that describe the IMAP protocol. Print and read the first two pages of one of these RFCs.
What will be its volume under a pressure : The volume (V) of a gas varies inversely as the pressure (P) upon it. The volume of a gas is 200 cubic centimeters under a pressure of 32 kg per square centimeter. What will be its volume under a pressure of 20 kg per square centimeter?
What should the dimensions of the page : A rectangular page is to contain 54 square inches of printable area. The margins at the top and bottom of the page are each 1 inch, one side margin is 1 inch, and the other side margin is 2 inches. What should the dimensions of the page be so that..
Geologic events-such as volcanic activity : Geologic events, such as volcanic activity, plan an important role in forming many of our valuable resources, such as fossil fuel, lead, copper, and gold.
Define and find the ph at the equivalence point : Consider the titration of 52.0 mL of 1.2 M NaOH with 1.0 M HCl. Find the pH at all the following points. At the equivalence point.

Reviews

Write a Review

Computer Networking Questions & Answers

  Cisco packet tracer

You can use Cisco Packet Tracer for this assignment (more information on use of Packet Tracer can be discussed with your Lecturer in Tutorial class).

  If you had an enterprise organization

If you had an enterprise organization of 1000 users, and had to set up an intranet web server, which web server would you use? Please explain your answer. (I just need one good paragraph).

  Explaining security domain boundaries for personal computer

Recognize and explain Trust/Security Domain boundaries that may be suitable to personal computer (workstation) security in a business context.

  Systems analyst can help with project management tasks

Explain how systems analyst can help with project management tasks. Also, explain how new employee can contribute to tasks.

  Receiver decide which symbol was originally sent

How can a receiver decide which symbol was originally sent when a received "point" lies somewhere in between other points in the diagram?

  Pros and cons of routers and switches

Explain to your team the differences between routers and switches. Compare them and list the pros and cons of using each type of hardware.

  Design a simple layout of omni directional antennas

Would you recommend security for this network, and if so, what type of security? Discuss the options and justify your choice and design a simple layout of omni directional antennas to cover the entire warehouse.

  Alter minix three to count sent processes

The assignment is to alter Minix 3 to count sent processes and print it into table saying who sent and who's receiving. He said we require place to store counts and then print in readable fashion.

  Difference between symmetric and public key system

What is the most important difference between a symmetric key system and a public key system and in what way does a hash function provide a better message integrity check than a checksum

  Make a power table for numbers mod 11

Make a power table for numbers mod 11. Indicate how the table shows Fermat's theorem, label the primitive roots mod 11. Explain how you can tell they are primitive roots. Label the rows that make good power ciphers and explain

  Isps to disclose actual identities of people

It asks ISPs to disclose actual identities of these people. Should the ISPs comply with this request. Describe your reasoning

  Significant means for assessing health of existing network

Explain some of the most significant means for assessing health of existing network. Which do you believe is most significant, and explain why?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd