What is a communication protocol

Assignment Help Basic Computer Science
Reference no: EM131108537

1. What is a communication protocol? Conceptually, what two aspects of communication does a protocol specify?

2. What are two reasons for using layered protocol? What is one possible disadvantage of using layered protocol?

3. Explain how headers are added and removed as data passes through a layered model.

4. Describe how a network administrator uses the OSI model to isolate a network problem

5. List two advantages of using fiber optics over copper as a transmission medium

6. Describe any downside of using fiber optics over copper

7. While IP addresses are tied to specific networks. Ethernet addresses are not. Can you think of a good reason why they are not?

8. How does layer 3 switch differ from layer 2 switch?

9. Compare and contrast circuit switching and packet switching. Describe the tradeoffs between the two technologies. 

10. What is Client Server Computing?

11. What distinguishes client/server computing from any other form of distributed data processing?

12. In the cloud computing paradigm, virtualization and management of standard enterprise IT solution stacks are offered through the three levels of services: SaaS, PaaS, and IaaS. Explain the meaning of the following within the context of cloud computing:

(a) Software as a Service (SaaS)

(b) Platform as a Service (PaaS)

(c) Infrastructure as a Service (IaaS)

Reference no: EM131108537

Questions Cloud

Apply the large-sample approximation : Apply the large-sample approximation given in Comment 53 to the data in Table 8.9. Compare this approximation with the approximation based on (8.91) that was used in Example 8.6.
Hill yard corporation has a deferred tax asset : After a careful review of all available evidence, it is determined that it is more likely than not that $60,000 of this deferred tax asset will not be realized, prepare the necessary journal entry.
Calculate the book value of the existing computer system : Calculate the book value of the existing computer system. Calculate the after-tax proceeds of its sale for $200,000. Calculate the initial investment associated with the replacement project.
Analyze the graph : Include the exponential function representing the pliers, an explanation of which x and y values are meaningful, and the graph of this function.
What is a communication protocol : 1. What is a communication protocol? Conceptually, what two aspects of communication does a protocol specify? 2. What are two reasons for using layered protocol? What is one possible disadvantage of using layered protocol?
Distinguishes oligopoly from monopolistic competition : Why do oligopolies exist? Explain the characteristics of an oligopolists whose products you own or regularly purchase. what distinguishes oligopoly from monopolistic competition?
What amount should percheron report as total 2011 : What amount should Percheron report as total 2011 tax expense?
Concerned with the hypothesis that diabetes mellitus : The data in Table 8.12 are a subset of the data obtained by Shen et al. (1970) in an experiment concerned with the hypothesis that diabetes mellitus is not simply a function of insulin deficiency and that perhaps insulin insensitivity could play a..
Write a system of equations and graph : It turns out that, given the number of books Dr. Thompson wants to print, the two options cost the same amount. How many books is that - Write a system of equations, graph them, and type thesolution.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Determine value t (n) and expand the recurrence relation

Consider the following recurrence relation: T (1) = 6, and for n > 1, T (n) = 1 + 2T ([n/2]) Note. [x] is the the floor function. It rounds x down to the nearest integer.

  Difference between mass surveillance and targeted surveillan

What is the difference between mass surveillance and targeted surveillance?

  Compare a filtering firewall to a proxy firewall

Compare a filtering firewall to a proxy firewall in terms of protection against spoofing attacks,. Assume a configuration as in Figure 8.21, where the internal host under attack trusts the remote company user.

  What is nanotechnology explain it in detail

What is nanotechnology? Please include examples and how it's different from traditional manufacturing?

  Identify the logic needed to select a payment option

Examine the pseudocode sample provided, and explain what it does line by line.

  Perform bonferroni or another multiple comparisons procedure

In a similar manner, two loaves were stored for three, ?ve, and seven days before measurements were taken. The units are milligrams of vitamin C per hundred grams of ?our (mg/100 g).10 Here are the data:Explain why it is inappropriate to perform ..

  Determine if a number is factor or not

Implement a program to count the frequencyofwords in a text file. Thetext file is partitioned intoNsegments. Each segment is processed by a separate thread that outputs the intermediate frequencycount for its segment. The main process waits until ..

  Use the 2s complement

Problem 1  Convert the following decimal numbers into (a) 8-bit, (b) 16-bit, and (c) 32-bit binary numbers. For negative numbers, use the 2's complement. State "overflow" if a number cannot be represented correctly. 1)  45 ten. 2)   -81 ten.  3)-3,0..

  Explain the caching of disk blocks

Explain the caching of disk blocks in terms of database recovery. Also explain what a transaction rollback is and a cascading rollback. Remember to give illustrated examples.

  Write a driver program with a main method to read in data

"Using the PetRecord class stored on the K: drive, write a driver program with a main method to read in data for five Pets and display the following data.

  Relationship of human service organizations and populations

How do the unique relationship between human service organizations and the populations they serve impact ethical decisions?

  Draw the uml diagram and implement

Draw the UML diagram and implement the new GeometricObject class. Write a test program that uses the max method to find the larger of two circles and the larger of two rectangles.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd