Project 1 bull in your own words what rfc gives

Assignment Help Computer Networking
Reference no: EM13380344

Project 1

• In your own words, what RFC gives the protocol and specifications a news server must use to access the UseNet network? Print and read the first two pages of the RFC.

• In your own words, what RFC describes the Gopher protocol? Print and read the first two pages of the RFC.

• List and illustrate 5 RFCs that describe the IMAP protocol. Print and read the first two pages of one of these RFCs.

Project 2

Use the web site serverwatch and other sites linked to this site to research the following information:
a. List two examples of e-mail server software other than those mentioned in class. List three to six features of each software package and include the web site of the software manufacturer.
b. Find an FTP server product that can run on a Windows XP or Windows Vista or Windows 7 PC requiring few system resources and can be used by a small business to distribute software upgrades and patches.
c. Give three examples of news servers that can access UseNet listing the features of each. Include the price and the manufacturer's web site.

Project 3

If your ISP supports newsgroups, research these newsgroups to find one that is focused on understanding and using the Internet. What relevant newsgroups do you find? Subscribe to one of these newsgroups for a few days. Print and read one article from the newsgroup and summarize it for the purpose of this assignment.

Project 4

What are the four possible data-to-signal conversion combinations and in few words discuss each one of them?

Project 5

What happens when you introduce noise into digital data and digital signals?

Project 6

What is the purpose of using digital encoding schemes?

Project 7

What are the main characteristics of the multiplexed Earth station satellite topology?

Project 8

a. As a consultant for the First National Bank of Monroe, you have been asked to solve a problem on the bank's network that began on Monday. According to the bank manager, at the beginning of each day two of the 16 tellers have been unable to log on to the network. Two other tellers occasionally experience problems at the beginning of the day, but not if they get to work before everyone else. They receive an error that says something like "another machine is using that name". When you arrive at the bank, the college intern who has been setting up the machines tells you that he is using a program called Ghost to clone all PCs from a single disk image. In other words, an exact copy of one machine's software, operating system, and its properties has been copied to all of the computers. All of the PCs are brand new are running Windows 7, and use the same hardware and software. First National Bank's network consists of two Windows 2008 servers and runs both TCP/IP and NetBIOS/NetBEUI protocols. It uses DHCP to allocate TCP/IP addresses. What might be preventing the two tellers from logging on to the network in the morning?

b. First National Bank's president congratulates you on quickly solving the problem. She then shares the information that she's about to make an offer to buy Monroe other bank, Metropolitan Savings. She's worried that the two banks' networks won't integrate easily. She isn't sure what kinds of severs or workstations are used by the other bank, but Metropolitan Savings' manager mentioned something about a network that relies on the Internet. What can you tell her about integrating the two systems? What protocols would you recommend that she use or continue to use to facilitate the integration process?

c. Six months later, First National Bank has successfully consolidated the networks at its original location and at its new acquisition. Business is booming, and the bank is investigating the possibility of allowing customers to check their account balances from the Web. However, the bank's president tells you the bank doesn't have its own connection to the Internet at this time. She understands that she needs to obtain IP addresses for all of her machines. But, she says, they are already using IP addresses internally and they work well without having to pay ICANN for new IP addresses.

Would you recommend leaving the bank's IP addressing as is or changing it? How do you suggest that the bank obtain Internet access? What concerns would you bring up with regard to allowing customers access to their account information off the Web? How might Internet access affect the ban's internal LAN?

Reference no: EM13380344

Questions Cloud

1 character strings in c and c are implemented as arrays : 1. character strings in c and c are implemented as arrays ofnbspchar. these arrays can be initialized to string
Backgroundjulia and robert have made progress in the : backgroundjulia and robert have made progress in the development of a strategic plan for kahuna cleaning supply. robert
Given the following sample database diagram do the : given the following sample database diagram do the followingcreate the needed tables in the sql server environment just
Part 1in your own words answer the following questionswhat : part 1in your own words answer the following questionswhat is network infrastructure management? what are the
Project 1 bull in your own words what rfc gives : project 1 bull in your own words what rfc gives the protocol and specifications a news server must use to
The australian commonwealth government has developed a : the australian commonwealth government has developed a cloud computing strategy and cloud computing policy and you as
You have no guarantees about the accuracy of the input from : you have no guarantees about the accuracy of the input from the user. you have to check all input and give helpful
Write a program called a2p1 to run in the lc-3 simulator : write a program called a2p1 to run in the lc-3 simulator. the program asks for the user to type in his or her upi. then
Part 1 you will implement a program where the computer : part 1 you will implement a program where the computer plays against a human opponent. the game will start with a

Reviews

Write a Review

Computer Networking Questions & Answers

  Describe the function or purpose of a virtual machine

Which of the following is the best definition/description of the chroot jail Linux/Unix security control?

  Design a solution to this problem using private vlans

You have a fifth webserver that is serving a web application and therefore it requires access to the database server. This webserver and the database server should ONLY be able to communicate with each other and the gateway.

  Explain company can manage snmp from corporate location

It is managed locally at locations which are monitoring. Write one-page proposal of how this company can manage SNMP from corporate location.

  Design communication system for transmission of four sources

Design a communication system (block diagram) that will allow the transmission of these four sources over the telephone channel using FDM with SSB(single sideband) subcarriers

  Find the required bit rate if sampling rate is given

Find out the required bit rate. Suppose that the sampling rate is 8000 samples per second and that one framing bit is added to each frame.

  Case studynetworks are evolving scalability presentation

case studynetworks are evolving. scalability presentation acts reliability safety measures and cost considerations are

  Explore ways to secure a wireless network and present

Explore ways to secure a wireless network and present your findings in a brief report(1 page is fine, more is ok). Talk about your own experiences with using a wireless network, including the things you do to keep the network secure.

  What is a survey

How the researchers are addressing the issue, which direction the research is going, the probable future research direction, conclusion/your comments, and references.

  Explain get nearest server request from client

Each of network segments has at least one NetWare server on it. Which of the given replies to Get Nearest Server (GNS) request from client?

  Problems-mix statically and dynamically assigned addresses

Describe what types of problems could result from having a mix statically and dynamically assigned addresses on the same network.

  The purpose of this two-part project is to compute the

the purpose of this two-part project is to compute the students ability to analyze security requirements and prepare a

  Explain system gives protection using bell-lapadula policy

A computer system provides protection using the Bell-LaPadula policy. How would a virus spread if: The virus were placed on the system at system low (the compartment that all other compartments dominate)?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd