Mis 589 Chapter 5 Questions

Submitted by: Submitted by

Views: 592

Words: 352

Pages: 2

Category: Science and Technology

Date Submitted: 09/28/2012 10:16 AM

Report This Essay

CHAPTER 5 QUESTIONS

Q3) As the name implies, TCP/IP has two parts. TCP is the transport layer protocol that links the application layer to the network layer. It performs packetizing: breaking the data into smaller packets, numbering them, ensuring each packet is reliably delivered, and putting them in the proper order at the destination. IP is the network layer protocol and performs addressing and routing. IP software used at each of the intervening computers through which the message passes; it is IP that routes the message to the final destination.

The TCP/IP was developed for the U .S. Department of Defense’s Advanced Research Project Agency network (ARPANET). TCP/IP is the transport/network layer protocol used on the Internet. It is also the world’s popular network layer protocol, used by almost 80 percent of all BNs, MANs. In 1998, TCP/IP moved past IPX/SPX as the most common protocol used on LANs.

Q4) Computers can have three different addresses: application layer address, network layer address, and data link layer address. Data link layer addresses are usually part of the hardware whereas network layer and application layer addresses are set by software. Internet registrars assign network layer and application layer addresses for the Internet. Addresses within one organization are usually with the same first 3 bytes. Subnet masks are used to indicate whether the first 2 or 3 bytes (or partial bytes) indicate the same subnet. Some networks assign network layer addresses in a configuration file on the client computer whereas others use dynamic addressing in which a DHCP server assigns when a computer first joins the network.

Q8) A Subnet mask is a 32-bit number that masks an IP address, and divides the IP address into network address and host address. Subnet Mask is made by setting network bits to all "1"s and setting host bits to all "0"s. Within a given network, two host addresses are reserved for special purpose. The "0" address is assigned a...