What rfc describes the gopher protocol

Assignment Help Computer Networking
Reference no: EM13192508

Project 1

• In your own words, what RFC gives the protocol and specifications a news server must use to access the UseNet network? Print and read the first two pages of the RFC.

• In your own words, what RFC describes the Gopher protocol? Print and read the first two pages of the RFC.

• List and illustrate 5 RFCs that describe the IMAP protocol. Print and read the first two pages of one of these RFCs.

Project 2

Use the web site serverwatch and other sites linked to this site to research the following information:
a. List two examples of e-mail server software other than those mentioned in class. List three to six features of each software package and include the web site of the software manufacturer.
b. Find an FTP server product that can run on a Windows XP or Windows Vista or Windows 7 PC requiring few system resources and can be used by a small business to distribute software upgrades and patches.
c. Give three examples of news servers that can access UseNet listing the features of each. Include the price and the manufacturer's web site.

Project 3

If your ISP supports newsgroups, research these newsgroups to find one that is focused on understanding and using the Internet. What relevant newsgroups do you find? Subscribe to one of these newsgroups for a few days. Print and read one article from the newsgroup and summarize it for the purpose of this assignment.

Project 4

What are the four possible data-to-signal conversion combinations and in few words discuss each one of them?

Project 5

What happens when you introduce noise into digital data and digital signals?

Project 6

What is the purpose of using digital encoding schemes?

Project 7

What are the main characteristics of the multiplexed Earth station satellite topology?

Project 8

a. As a consultant for the First National Bank of Monroe, you have been asked to solve a problem on the bank's network that began on Monday. According to the bank manager, at the beginning of each day two of the 16 tellers have been unable to log on to the network. Two other tellers occasionally experience problems at the beginning of the day, but not if they get to work before everyone else. They receive an error that says something like "another machine is using that name". When you arrive at the bank, the college intern who has been setting up the machines tells you that he is using a program called Ghost to clone all PCs from a single disk image. In other words, an exact copy of one machine's software, operating system, and its properties has been copied to all of the computers. All of the PCs are brand new are running Windows 7, and use the same hardware and software. First National Bank's network consists of two Windows 2008 servers and runs both TCP/IP and NetBIOS/NetBEUI protocols. It uses DHCP to allocate TCP/IP addresses. What might be preventing the two tellers from logging on to the network in the morning?

b. First National Bank's president congratulates you on quickly solving the problem. She then shares the information that she's about to make an offer to buy Monroe other bank, Metropolitan Savings. She's worried that the two banks' networks won't integrate easily. She isn't sure what kinds of severs or workstations are used by the other bank, but Metropolitan Savings' manager mentioned something about a network that relies on the Internet. What can you tell her about integrating the two systems? What protocols would you recommend that she use or continue to use to facilitate the integration process?

c. Six months later, First National Bank has successfully consolidated the networks at its original location and at its new acquisition. Business is booming, and the bank is investigating the possibility of allowing customers to check their account balances from the Web. However, the bank's president tells you the bank doesn't have its own connection to the Internet at this time. She understands that she needs to obtain IP addresses for all of her machines. But, she says, they are already using IP addresses internally and they work well without having to pay ICANN for new IP addresses.

Would you recommend leaving the bank's IP addressing as is or changing it? How do you suggest that the bank obtain Internet access? What concerns would you bring up with regard to allowing customers access to their account information off the Web? How might Internet access affect the ban's internal LAN?

Reference no: EM13192508

Questions Cloud

The first american political parties emerged from conflict : The first American political parties emerged from the conflict between:
Explain sample of a diprotic acid is titrated : A 30.0 mL sample of a diprotic acid is titrated with 0.255 M KOH. If 59.5 mL of base is required to reach the second equivalence point
Find the height of the trapezoid : trapezoid has an area of 80.75 sq. in., and its two bases are 7 and 12 inches long. find the height of the trapezoid.
Calculate the elasticity of demand for alcohol consumption : Two economists took a close look at a broad survey of more than 50,000 persons each year from 1987 to 1999. They found that drinkers do reduce their consumption substantially in economic downturns.
What rfc describes the gopher protocol : What RFC describes the Gopher protocol? Print and read the first two pages of the RFC and list and illustrate 5 RFCs that describe the IMAP protocol. Print and read the first two pages of one of these RFCs.
What will be its volume under a pressure : The volume (V) of a gas varies inversely as the pressure (P) upon it. The volume of a gas is 200 cubic centimeters under a pressure of 32 kg per square centimeter. What will be its volume under a pressure of 20 kg per square centimeter?
What should the dimensions of the page : A rectangular page is to contain 54 square inches of printable area. The margins at the top and bottom of the page are each 1 inch, one side margin is 1 inch, and the other side margin is 2 inches. What should the dimensions of the page be so that..
Geologic events-such as volcanic activity : Geologic events, such as volcanic activity, plan an important role in forming many of our valuable resources, such as fossil fuel, lead, copper, and gold.
Define and find the ph at the equivalence point : Consider the titration of 52.0 mL of 1.2 M NaOH with 1.0 M HCl. Find the pH at all the following points. At the equivalence point.

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain graphic files were transmitted by a e-mail

Several graphic files were transmitted by a e-mail from the unknown source to suspect in the ongoing investigation. Lead investigator provides you these graphics files and tells you that at least four messages must  be embedded in them.

  Determine actual maximum channel capacity

Determine the theoretical maximum channel capacity (Kbps) of traditional telephone lines (POTS)? Will that be the actual maximum channel capacity?

  Explain client-server architecture

Explain client/server architecture, including fat and thin clients, middleware and client/server tiers. Make use of Visio to prepare architecture diagrams that enhance your explanation.

  Explain differences in wireless dsl services

Wireless DSL is available in her apartment building for $45 per month for 1.5 Mbps down and 256 Kbps up. Explain the differences in these services and make a recommendation.

  How to select peer-to-peer-server-based or hybrid network

Individual employees also should be able to control resources their own machines. Would you select peer-to-peer, a server-based, or a hybrid network? Explain why?

  Determine alice-s secret random number

Alice and Bob utilize Diffie-Hellman key exchange protocol with common prime modulus p = 11 and common base a = 2. Determine Alice's secret random number xA?

  What routing protocol is suitable for retail customer

What routing protocol would you suggest for this network? Describe the reasons for your selection; refer to specific features of protocols that influenced your selection.

  Explaining client-server environment

You are administrator of a client-server environment. What type of network would you install and how would pieces and components of this network relate to each other?

  Benefits of authentication scheme

An example of when a failure may occur is if the clinet's MAC address is explicitly excluded in the AP/router configuration. What are the benefits of this authentication scheme?

  Encapsulate ftp datagram into tcp datagram

Segmentation of a file and forming FTP datagrams: Read first 'x' number of bytes and use them as part of payload section of an FTP datagram. Encapsulate the FTP datagram into TCP datagram (generation of TCP packets)

  Find length of longest consecutive sequence of os in input

Input stream to 4B/5B block encoder is 0100 0000 0000 0000 0000 OOOI. Answer the following questions: Determine length of longest consecutive sequence of Os in input?

  Design a simple layout of omni directional antennas

Would you recommend security for this network, and if so, what type of security? Discuss the options and justify your choice and design a simple layout of omni directional antennas to cover the entire warehouse.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd