Nt1310 Unit 3 Assignment 1

Decent Essays
Question 1
1.1)T.C.P(transmittion control protocol)-It is the language the computer uses to acess the internet. It is made up of protocalls which are made to establish a network of networks and provide a host with access to the internet.
1.2)I.P(Internet Protocol)-It is the way or protocol of how data is sent from one computer to another computer on the internet.
1.3)Physical Layer-the Physical layer is the interface between the medium and the device.It is made to transfer raw bits over a communication channel. The data link layer-Its main task is too turn a raw transmittion facility into a line that does not have undetected transmittion erros.It also provides low level error detection and correction. The network layer-the network layer’s job is to route packets of data across the network.The network layer is also responsible for handeling congestion.
…show more content…
The session layer-The session layer is what allows people on different computers to have a connection between then.It is what connects the users to the network.
The Presentation Layer-The presentation Layer makes sure the computers speak the same language.
The Application Layer-The application layer contains a lot of protocols that are used a lot by the end users.It also provides services to applications that you use directly so that it can communicate effectively to other programs in the

Related Documents

  • Great Essays

    Nt1310 Unit 7

    • 1416 Words
    • 6 Pages

    1. What provides the physical connection between workstations on the network? The cables/wires and network interface card (NIC) provide the physical connection between work stations on the network. 2. What directs the flow of data over the network?…

    • 1416 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Internet/the Internet - A global system of interconnected computer networks that use the Internet protocol. List the Words Inside…

    • 1494 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    1. Computer hardware: include computer machines, hard-drive or equipment on which data can be stored and recorded. It also consists a variety of other devices such as servers that help the IS do their tasks efficiently. 2. Operating system platforms: this is what runs the hardware devices, the software is used to act as an interface for the user and manage the incoming date and output.…

    • 266 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Ntc300 Unit 1

    • 1895 Words
    • 8 Pages

    To fully understand how servers and clients are able to exchange information across the Internet we must understand the workings of the most widely used protocol used in computing. That protocol is the TCP/IP protocol and associated common set of rules for addressing. IP addresses The TCP/IP protocol suite uses an Internet address, or IP address, to identify each network interface on the network. Devices can have more that one interface connected to the network. Each interface must have a unique IP address that identifies that interface.…

    • 1895 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    We will begin by defining what a network is. To define a computer network it is a collection of interconnected devices capable of sharing meaningful information and resources with one another. On this network computers can communicate with other computers on the network. Computers can be very powerful when they 're connected to one another in a data network that allows them to share data even it will allows the computer to be connected to the outside so that they will be able to share data geographically wide areas. A network usually has several computers on the network and they are usually connected by a communication device such as a router or a switch these are also known as Network devices.…

    • 722 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    1. (5 points) Compare and contrast the three types of addresses used in a network. Application layer – A port is assigned to an application for direct routing of incoming and or outgoing data. Network layer – IP addresses are assigned to each individual computer. The IP addresses can change and are often assigned by the DHCP server.…

    • 766 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    In addition there was another thing that William Yeager did that help us not only creating the router ,but also the multiprotocol system that made to create the IPV4 and IPV6 that most our routers use that connects to all other routing to the main server of each local area that can be useful for the router to communicate with websites on the internet and find a match for that site and code to recognize to store as memory for the next search for this specific one("History of the Router | EHow." Subscribe to Our RSS. N.p., n.d. Web. 15 Jan.).…

    • 1350 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    1. Read the paper; http://www.garykessler.net/library/tcpip.html. Based on this paper (supplement as needed with other material from the Internet), please answer the following. Solution:  Define ARP – one sentence summary is sufficient ARP is an acronym for Address Resolution Protocol which is a network layer protocol used to convert or map IP address into physical address like MAC address.  Explain the difference between network and machine addresses A network address is a unique address which is used as identifier for a node/computer on a network which is internet or intranet.…

    • 1622 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Run the ipconfig command to analyze the IP address and subnet that gives the addressing schema for the network. 2. What information can you retrieve from the Domain Name System (DNS)? From the DNS, the following information can be retrieved a. Number of servers and workstations deployed on the network.…

    • 648 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    The main functions of Security Onion are capturing packets, analysis tools, and NIDS and HIDS. Full Packet Captures are done via netsniff-ng – it captures all the network traffic that passes through the sensors and subsequently stores them. Analysis tools such as sguil, OSSEC, Bro, and others help the analyst understand the data. NIDS and HIDS these inspect the systems or the network traffic, and log and alert any suspicious activity. An Intrusion Detection System is a piece of software or hardware security management for computers and networks.…

    • 1488 Words
    • 6 Pages
    Great Essays