It220 Unit 2-1

In: Computers and Technology

Submitted By garycredit
Words 524
Pages 3
1. What are the layers of the TCP/IP model?
Application Layer
Transport Layer
Network Layer
Network Access Layer

2. Which layer of the TCP/IP model processes requests from hosts to make sure a connection is made to the appropriate port?
Application Layer

3. What are well – known ports?
Ports reserved by ICANN

4. Identify the port numbers for the following applications.
a. Telnet: 23
b. HTTP: 80
c. FTP: 20, 21
d. DNS: 25
e. DHCP: 67, 68

5. Define the purpose of a connection oriented protocol.
Establishes a network connection, manages the delivery of data, and terminates the connection. (TCP)

6. What three packets are exchanged between two hosts when establishing a TCP connection?
SYN
SYN ACK
ACK

7. What is the purpose of a sequence number (SEQ=) in TCP data packets?
To initiate the TCP handshake

8. Explain how a host knows whether a data packet was not received.
Host responds with ACK packet

9. Describe how TCP connection is terminated?
Host A sends Host B a FIN packet indicating the connection has been terminated.

10. What is a connectionless protocol?
UDP(User Datagram Protocol)

11. What is the purpose of the Internet layer in the TCP/IP protocol suite?
Used for addressing and routing the data packets.

12. What is the purpose of an ARP request?
Asking which network has an IP address

13. What is the purpose of an ARP reply?
The protocol that contains the hardware address for a destination host

14. What important networking-troubleshooting tool is part of ICMP, and how does it test a network connection?
Ping, verifies connectivity with another host in the network.

15. When is IGMP used?
When one host needs to send data to many destination hosts

16. The network interface layer of the TCP/IP model defines how the host connects to what network?
Network interface layer

17. Convert the following…...

Similar Documents

Unit 2 Part 1

...Unit 2 Part 1 Shamica Jones Kaplan University Business Law September 1, 2013 The factors that indicate whether Davis owed Esposito a duty of care, so as to avoid allegations of negligence consist of three basic elements. “They are: 1. The likelihood that Davis’ conduct will injure others, taken with 2. The seriousness of the injury, if it happens, 3. Balanced against the cost of the precaution he must take to avoid the risk of negligence. . If the product of the likelihood of the injury exceeds the burden of the precautions, the risk is unreasonable and the failure to take precautions is negligence.” The Louisiana law that set precedents over trip-and-fall cases was Frelow v. St. Paul Fire & Marine Ins. The ruling in this case was that Louisiana law recognizes a legal duty on the part of employees to exercise reasonable care not to obstruct the flow of pedestrian traffic. Esposito was walking out of an exit of an arts and crafts show when Davis, an employee of the show’s producer decided suddenly to turn, without warning, and knock Esposito to the ground. One witness account said, “It appeared as if Davis had forgotten something because he snapped his fingers while quickly turning”. Davis admitted that he did not look when he turned. These factors indicate that Davis was negligent. It was the show’s producers’ responsibility to make sure that precautions were taken to avoid risk on the property. Esposito had to prove that Davis...

Words: 811 - Pages: 4

Unit 1 Assignment 2

...Unit 1 Assignment 2 The Internal Use Only data classification standard of Richman Investments has many different infrastructures domains that are affected via internal use only data classification. More than all others, the three infrastructures that are affected the most are the User Domain, Workstation Domain and the LAN Domain. The reason why the User Domain infrastructure is one of the most affected infrastructures is because the User Domain infrastructure is the infrastructure that allows users to access the network. This is a problem because many users do not fully understand everything, all the time and thus is bound to make a mistake sooner or later. With so many users on our network, this is probably the most vulnerable domain infrastructures in our network. The Workstation Domain is also another domain infrastructure that has great reason to be affect by internal use only data because this is where the user connects to the our network. The reason that this can cause security threats and other problems is because this domain can be connected via a personal laptop or even a cell phone or other mobile device. The final infrastructure domain that is greatly affected is the LAN domain. The reason that this domain infrastructure is affected by internal use only data is because this domain is the open domain available companywide, to anybody in the building or even near the building via a wireless device. If we watch these specific areas closer and implement some......

Words: 275 - Pages: 2

Unit 2 Assignment 1

...IS3340-WINDOWS SECURITY | Recommendations for Access Controls | Unit 2 Assignment 1 | | [Type the author name] | 4/3/2014 | | Access Control is the defined as “the selective restriction of access to a place or other resource”, in the RFC 4949. “The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.” Simply put the ability to read, write, modify, or deleting information or files is what Access Control is. It is more than this, in the permissions (authorization) granted to each Security Group or Individual User. The permissions mentioned in the previous paragraph are rights that a user is allowed to access, create, modify, or delete the file(s) inside a file folder, or objects. These are all permissions (authorizations) controlled by the Authorized Windows Security Personnel of the file structure. We will list some examples of how this outlined and what the impact would be, but first understand that requirements for the permissions is controlled from the Group Level, other than by Individual User, because it is easier to control from a security standpoint when you want to modify these abilities. There are four folders created (D:\ERPdocuments, D:\ERPdocuments\HRfiles, D:\ERPdocuments\SFfiles, D:\ERPdocuments\MGRfiles) which we want to allow specific permissions for certain functions (tasks). For example; by modifying the permissions under the specific user account for HRmanager to include...

Words: 436 - Pages: 2

Unit 2 Assignment 1

...Unit 2 Assignment 1: Strengths and Challenges Reflection Letter Course Objectives and Learning Outcomes Define terms and concepts related to strategies for technical professionals. Communicate information using Microsoft Office productivity tools and email. Assignment Requirements This assignment coordinates with Unit 2 Lab 1: Introductory Word Lab. Create and send a letter to your instructor executed in MS Word that discusses your questions, concerns, and what you look forward to in Strategies for the Technical Professional. As a part of your letter, make an assessment of your strengths, such as the skills and experience you bring to the class. Also discuss your challenges, perhaps your circumstances, habits, or past academic history, as well as the parts of the curriculum that may be new to you, may not appear as relevant to your goals and objectives, or may be difficult for you to learn and apply. Required Resources Computer with Internet access and MS Word installed. Submission Requirements Your letter should meet the following specifications: Orientation: Portrait Font: 12-point Times New Roman or 10-point Arial Spacing: Double spaced Margins: Normal, Narrow, or Moderate Length: Two to five paragraphs Header: Right justified, including your name, the course number, day, and time Text format: Body of letter left justified Salutation: Appropriate greeting to open letter Closing: Appropriate sign-off and full name as......

Words: 1181 - Pages: 5

Unit 2 Assignment 1

...Eric Satchell NT1330 Service Provider Types Unit 2 Assignment 1 July 3, 2014 Comparing Service Providers There are a lot of companies providing services, but AT&T provided telephone communication to the public. AT&T monopolized the telecommunication industry until the United States took them to court for antitrust and won. AT&T was broken up into eleven smaller companies, call Baby Bells. One of the companies that derived from this law suit was the Regional Bell Operating Company or RBOC. RBOC was a term that described one of the US telephone companies that provided telephone, telegraph, and long distance to the consumers. RBOC is part of a local exchange carrier allowed to compete for business. RBOC services internet service which in turn dealt with digital data. The merging companies provided different types of service based on the Telecommunication Act of 1996. ILEC or incumbent local exchange carrier is a telephone company that provided local telephone communications before the ruling to break up the Ma Bell Company. The FCC ruled that the ILECs must provide other telecommunications service providers access to their equipment to be able to provide a better rate to the consumer. This......

Words: 480 - Pages: 2

Unit 1 Assignment 2

...September 25, 2014 NT 2580 Unit 1 assignment 2 A Data Classification Standard is information or data shared internally by an organization. The private information or data may not be included; core communications are not planned to leave the organization. The report is designed to describe and explain the standards for the “Internal use only” data classification at the Richman Investments location, this report will address which IT set-up domains are affected by the standard and how. The first IT set-up affected by core use is the User Domain. The User Domain describes the people who access an organization’s information system. The user domain will enforce an Acceptable Use Policy (AUP) that defines what each user can and cannot do with the company’s data. With company users, any outsiders, contractor’s or third party agents will also need to agree and comply with the Acceptable Use Policy. Any violation will be taken up with management or the proper establishments to access further corrective action. Work Station Domain: This is where most of the company’s users connect to get to the IT set-up. No personal devices or removable media may be allowed on this network ever. All devices and removable media will be issued by the company for official work use. Access Control Lists (ACLs): ACLs will be tired up to appropriately define which access the users are allowed to use. Any violation causes an immediate suspension of rights and the person(s) in violation will be subject to......

Words: 414 - Pages: 2

Unit 2 Assignment 1

...Introduction to Networking Unit 2: Assignment 1 Indentifying Network Topologies Identify the major needs and major stakeholders for computer networks and network applications. The major stakeholders for computer networks and network applications are the ones who use it or relay on it to do business. The main stakeholders are the ones who uses the network or applications to get their work done for their company. The next stakeholder is the company or people who rely on the first company to get what they need. The ones who design the applications or the network are stakeholders in the fact they need to make sure their work is done properly so others can do their job. The owners are also stakeholders in the fact that others rely on their people and software to get their work done. Then there is the end-users who are also stakeholders because we need the network and applications to do our daily job. Identify the classifications of networks and how they are applied to various types of enterprises. PAN (Personal Area Network)—personal. You as an individual and the range is around that person LAN (Local Area Network)—network of interconnected computers within a small geographic area. Area of LAN’s are a room, building or group of buildings, offices, schools. The range is 10m – 1km MAN (Metropolitan Area Network)—a network design for a town or a city. The range is about 10km.Examples would be London, England or Geneva, Switzerland, WAN (Wide Area Network—a network that......

Words: 289 - Pages: 2

Unit 2 Assignment 1

...January 6, 2015 January 6, 2015 Todd Eppes NT1310 Todd Eppes NT1310 Service Provider types Unit 2 Assignment 1 Service Provider types Unit 2 Assignment 1 Todd Eppes January 1, 2015 NT1310 Unit 2 Assignment 1 Service Provider Types RBOCS stands for Regional Bell operating company. It was one of the United States regional telephone companies that were created as a result of the breakup of AT&T. They are allowed to compete for long distance telephone traffic under certain circumstances. RBOCs are generally in competition for digital data and internet traffic with wireless service providers and cable TV companies. ILEC is short for incumbent local exchange carrier. IT is a telephone company that was providing local service when the Telecommunications Act of 1996 was enacted. They are in contradistinction to CLEC. GTE was the second largest ILEC after “The Baby Bells” but has since been absorbed into Verizon. CLEC stands for competitive local exchange carrier. IT is a telecommunications provider company competing with other, already established carriers. CLECs have evolved from the competitive access providers that began to offer private line and special access services in competition with the ILECs beginning in 1985. MSO is short for multiple-system operator. This is an operator of multiple cable or direct-broadcast satellite television systems. Though in the strictest sense any cable company that serves multiple communities is......

Words: 274 - Pages: 2

Unit 1 Assignment 2

...September 25, 2014 NT 2580 Unit 1 assignment 2 A Data Classification Standard is information or data shared internally by an organization. The private information or data may not be included; core communications are not planned to leave the organization. The report is designed to describe and explain the standards for the “Internal use only” data classification at the Richman Investments location, this report will address which IT set-up domains are affected by the standard and how. The first IT set-up affected by core use is the User Domain. The User Domain describes the people who access an organization’s information system. The user domain will enforce an Acceptable Use Policy (AUP) that defines what each user can and cannot do with the company’s data. With company users, any outsiders, contractor’s or third party agents will also need to agree and comply with the Acceptable Use Policy. Any violation will be taken up with management or the proper establishments to access further corrective action. Work Station Domain: This is where most of the company’s users connect to get to the IT set-up. No personal devices or removable media may be allowed on this network ever. All devices and removable media will be issued by the company for official work use. Access Control Lists (ACLs): ACLs will be tired up to appropriately define which access the users are allowed to use. Any violation causes an immediate suspension of rights and the person(s) in violation will be subject to......

Words: 413 - Pages: 2

Unit 2 Assignment 1

...10/ 1/ 2014 NT2580 Unit 2 assignment 1 The workgroup consists of three primary workgroups, which contain group membership lists of users within the Active Directory infrastructure that currently exists on the SMB Server that is located within the confines of the LAN structure. The security breach, which is defined as any event that results in a violation of any of the CIA (confidentiality, integrity, availability) security principles, was caused by the SMB server being accessed by an unauthorized user due to a security hole that was detected by the server software manufacturer the previous day. The security patch will not be available until possible as long as three days, but hopefully within that timeframe. In addition, the LAN administrator needs at least one week (minimum) to download, test, and install the patch. To calculate the Window of Vulnerability (WoV) for this security breach, the following timeline will be used as a guideline to determine the basis for calculation: First it is important to understand the variables considered in this timeline formula. The WoV is the period within which defensive measures are reduced, compromised, or lacking. The WoV covers a timeline from the moment vulnerability is discovered and identified by the vendor. It also includes the time taken to create, publish, and finally apply a fix to the vulnerability. It is also important to explore the device(s) that were targeted by the attack. In this instance, being the SMB server within...

Words: 286 - Pages: 2

Unit 2 Asiignment 1

...Jonathan Cornmesser Unit 2 Analysis 1: Computer Shopper Assignment 1: COMPUTER | PROCESSOR | MEMORY | STORAGE | GRAPHICS | OS | PRICE | HP Desktop PC Elite 700 | Intel Core i5 4590 3.5Ghz Quad Core | 4GB 1333Mhz DDR3 | 500GB Hard Drive | Intel HD Onboard Graphics | Windows | $583 | Apple Desktop PC Mac PRO | Intel Xeon E5 5200 2.2Ghz Quad Core | 16GB 1866Mhz DDR3 | 480GB Solid State Drive | DUAL AMD Fire Pro Workstation Graphics | Mac OS X 10.9 Maverick | $3,858 | Lenovo G5080 Notebook | Intel Core i5 5200 2.2Ghz Quad Core | 6GB 1333Mhz DDR3 | 240GB Solid State Drive | Intel HD 5500 Onboard Graphics | Windows | $650 | Apple MacBook PRO | Intel Core i7 2.8Ghz Quad Core | 16GB 1600Mhz DDR3 | 1TB Solid State Drive | NVIDIA G-Force 750m HD Graphics | Mac OS X 10.9 Maverick | $3,100 | Assignment 2: Profession 1: Doctor I chose the Lenovo G5080 for Healthcare Professionals. It has the right amount of memory, processor speed, drive capacity, and graphics technology to accurately reproduce patient images. These images being X-Rays or MRI results. The device used should be mobile for treating multiple patients on multiple floors. Profession 2: Teacher I chose the HP Desktop PC Elite 700 for college instructors. With the amount of memory and processor speed available, this makes a great computer for generating homework assignments and creating Power Point presentations. Profession 3: Graphic Designer I chose the MacBook PRO for Graphic Design. It sports an Intel...

Words: 270 - Pages: 2

Unit 2 Assignment 1

...NT1310 Week 2 – Unit 2 Assignment 1 Service Provider Types There are five different types of telecommunication types to date. First of which is RBOC – (regional bell operating company) which was a telephone company created as a result of the breakup of AT&T. The seven original regional Bell companies were Ameritech, Bell Atlantic, BellSouth, NYNEX, Pacific Bell, Southwestern Bell, and US WEST. The reason why this was so important was because these companies are what provided local telephone service while AT&T provided the long distance phone service. These are what made up the Local Exchanges or the LEC’s. ILEC or incumbent local exchange carrier was a telephone provider that provided local service prior to the telecommunications act of 1996. These play a major role because these carriers are what own the local loops/exchange and facilities in that area. CLEC’s are the exact same thing except they are the competitor to the ILEC’s but provided their own networking and switches for local service. MSO or Multi system Operator – is owner of multiple cable and satellite television systems. This ties into what an ISP is. An ISP is simply and Internet service provider that provides a mean for accessing the internet. MSO is majorly known for being cable companies, because of this cable companies are providing internet to cable customers (usually as bundles with their plan). They work within each other because......

Words: 314 - Pages: 2

Unit 2 Discussion 1

...Unit 2 Discussion 1: Familiar Domains As an IT Admin you mainly deal with all seven domains, but the ones I deal with currently are work station, user domain and remote access. In any environment that you work with any of these 7 domains countermeasures are needed. It’s very important to make sure your network is secure and there are quite a few actions to take to ensure that it is safe as possible. Although no domains are 100% secured it’s always good to make sure all updates and patches are up to the most recent. I will also name a few other ways to protect certain domains in a typical IT infrastructure. Some countermeasures to take for user domain are making sure to have all users aware of security. Also have restricted access for a company’s terminal server and observe abnormal employee activity. Anti-virus is also needed to make sure the computers servers aren’t infected with malicious programs that cause loss in important documents. With a work station you can add a firewall to prevent unwanted traffic from infiltrating the network. Ensuring that your workstation has the latest service packs and patches update will also help protect any holes that could lead to hacking. Also with remote access it’s good to make sure only that person has access to certain files and must keep their password secure and not make a weak password so it does not get compromised. All these......

Words: 267 - Pages: 2

Unit 2 Ass 1

...Unit 2: Business resources P1: Within this assignment I will be looking into the recruitment documentation needed in a selected organisation. The organisation I will be assessing is Asda. Human Resource Management (HRM) is the function within Asda that focuses on recruitment, management, and providing direction for the people who work in the organization. Human Resource Management can also be performed by line managers. Human Resource Management is the organizational function that deals with issues related to people such as compensation, hiring, performance management, organization development, safety, wellness, benefits, employee motivation, communication, administration, and training. Human Resource Management is a process of managing manpower through proper selection, training and assigning right tasks to suitable persons in an organization. This is the recruitment documentation used in Asda: Firstly the human resources team decide what job is needed due to lack of staff and they look into what the colleague will have to do. This is called job analysis. Next is the job description and this describes what tasks the colleague will be undertaking. Along with this is the job specification and in this it describes what characteristics and skills are required for the role. After this they have to attract applicants and to do this they have to advertise the job internally and externally, the applicants apply through an application form or a CV. This tends to include......

Words: 1637 - Pages: 7

Unit 1 and Part of 2

...Unit 1 Homework 1. Why is the CPU the most important component in a computer? It’s the brain of the computer, without it nothing else matters. 2. What number does a bit that is turned on represent? What number does a bit that is turned off represent? 1, 0 3. What would you call a device that works with binary data? digital 4. What are the words that make up a high-level programming language called? Key Words 5. What are the short words that are used in assembly language called? Mnemonics 6. What is the difference between a compiler and an interpreter? A COMPILER is a program that translates a high-level language program into a separate machine language program. An INTERPRETER is a program that both translates and executes the instructions in a high-level language program 7. What type of software controls the internal operations of the computer’s hardware? OS’s Unit 1 Research Assignment 1. SQL It’s no surprise SQL (pronounced ‘sequel’) tops the job list since it can be found far and wide in various flavors. Database technologies such as MySQL, PostgreSQL and Microsoft SQL Server power big businesses, small businesses, hospitals, banks, universities. Indeed, just about every computer and person with access to technology eventually touches something SQL. For instance, all Android phones and iPhones have access to a SQL database called SQLite and many mobile apps developed Google, Skype and DropBox use it directly. 2. Java The tech community recently......

Words: 1008 - Pages: 5

Murray Alper | Kitakubu Katsudou Kiroku | Stretch Armstrong and the Flex Fighters - Season 2