What rfc describes the gopher protocol

Assignment Help Computer Networking
Reference no: EM13192508

Project 1

• In your own words, what RFC gives the protocol and specifications a news server must use to access the UseNet network? Print and read the first two pages of the RFC.

• In your own words, what RFC describes the Gopher protocol? Print and read the first two pages of the RFC.

• List and illustrate 5 RFCs that describe the IMAP protocol. Print and read the first two pages of one of these RFCs.

Project 2

Use the web site serverwatch and other sites linked to this site to research the following information:
a. List two examples of e-mail server software other than those mentioned in class. List three to six features of each software package and include the web site of the software manufacturer.
b. Find an FTP server product that can run on a Windows XP or Windows Vista or Windows 7 PC requiring few system resources and can be used by a small business to distribute software upgrades and patches.
c. Give three examples of news servers that can access UseNet listing the features of each. Include the price and the manufacturer's web site.

Project 3

If your ISP supports newsgroups, research these newsgroups to find one that is focused on understanding and using the Internet. What relevant newsgroups do you find? Subscribe to one of these newsgroups for a few days. Print and read one article from the newsgroup and summarize it for the purpose of this assignment.

Project 4

What are the four possible data-to-signal conversion combinations and in few words discuss each one of them?

Project 5

What happens when you introduce noise into digital data and digital signals?

Project 6

What is the purpose of using digital encoding schemes?

Project 7

What are the main characteristics of the multiplexed Earth station satellite topology?

Project 8

a. As a consultant for the First National Bank of Monroe, you have been asked to solve a problem on the bank's network that began on Monday. According to the bank manager, at the beginning of each day two of the 16 tellers have been unable to log on to the network. Two other tellers occasionally experience problems at the beginning of the day, but not if they get to work before everyone else. They receive an error that says something like "another machine is using that name". When you arrive at the bank, the college intern who has been setting up the machines tells you that he is using a program called Ghost to clone all PCs from a single disk image. In other words, an exact copy of one machine's software, operating system, and its properties has been copied to all of the computers. All of the PCs are brand new are running Windows 7, and use the same hardware and software. First National Bank's network consists of two Windows 2008 servers and runs both TCP/IP and NetBIOS/NetBEUI protocols. It uses DHCP to allocate TCP/IP addresses. What might be preventing the two tellers from logging on to the network in the morning?

b. First National Bank's president congratulates you on quickly solving the problem. She then shares the information that she's about to make an offer to buy Monroe other bank, Metropolitan Savings. She's worried that the two banks' networks won't integrate easily. She isn't sure what kinds of severs or workstations are used by the other bank, but Metropolitan Savings' manager mentioned something about a network that relies on the Internet. What can you tell her about integrating the two systems? What protocols would you recommend that she use or continue to use to facilitate the integration process?

c. Six months later, First National Bank has successfully consolidated the networks at its original location and at its new acquisition. Business is booming, and the bank is investigating the possibility of allowing customers to check their account balances from the Web. However, the bank's president tells you the bank doesn't have its own connection to the Internet at this time. She understands that she needs to obtain IP addresses for all of her machines. But, she says, they are already using IP addresses internally and they work well without having to pay ICANN for new IP addresses.

Would you recommend leaving the bank's IP addressing as is or changing it? How do you suggest that the bank obtain Internet access? What concerns would you bring up with regard to allowing customers access to their account information off the Web? How might Internet access affect the ban's internal LAN?

Reference no: EM13192508

Previous Q& A

  What will be its volume under a pressure

The volume (V) of a gas varies inversely as the pressure (P) upon it. The volume of a gas is 200 cubic centimeters under a pressure of 32 kg per square centimeter. What will be its volume under a pressure of 20 kg per square centimeter?

  What should the dimensions of the page

A rectangular page is to contain 54 square inches of printable area. The margins at the top and bottom of the page are each 1 inch, one side margin is 1 inch, and the other side margin is 2 inches. What should the dimensions of the page be so that..

  Geologic events-such as volcanic activity

Geologic events, such as volcanic activity, plan an important role in forming many of our valuable resources, such as fossil fuel, lead, copper, and gold.

  Define and find the ph at the equivalence point

Consider the titration of 52.0 mL of 1.2 M NaOH with 1.0 M HCl. Find the pH at all the following points. At the equivalence point.

  What would drive interest rates in such an environment

what would an LM curve look like in a Quantity Theory world where velocity is fixed and is not impacted by interest rates (that is, M=kPY) what do you think would drive interest rates in such an environment

  What percentage of the total capacity is being used

A water storage tank has the shape of a cylinder with diameter 22 ft. It is mounted so that the circular cross-sections are vertical. If the depth of the water is 20 ft, what percentage of the total capacity is being used? (Round the answer to one..

  How much should you pay for the bond

A municipal bond pays 8.3% interest compounded semiannually on its face value of $2,000. The interest is paid at the end of every half-year period. Fifteen years from now the face value of $2,000 will be returned.

  Regular functional building

What elements distinguish a building as an architectural masterpiece as opposed to a regular functional building,

  At what speed does chuck travel

Chuck travels 117 miles in the same time that dana travels 105 miles. If chuck rate of travel is 4mph more than dana's, and they travel the same length of time, at what speed does chuck travel?

  How long will it take for the size of the colony to triple

A colony of bacteria increases according to the law of uninhibited growth (exponentially). How long will it take for the size of the colony to triple?

Reviews

Write a Review

 

Similar Q& A

  Security in bluetooth and other mobile devices

Analyze the factors that business managers must consider when determining if wireless and mobile devices are appropriate in their business environment.

  Reason to include padding block when padding is not required

It is considered good practice for the sender to pad every message, including messages in which the final message block is already complete. What is the motivation for including a padding block when padding is not needed.

  Describe concept of subnetting and subnet mask

Describe the concept of subnetting and concept of subnet masks. Why do we utilize subnetting? How do we know which bits are used to recognize network?

  Explain synchronous time division multiplexing

Synchronous time division multiplexing is used, along with the standard analog-to-digital sampling rate, and each sample is converted into an 8-bit value?

  Differentiate data-voice and video signals

Describe the differences between data, voice, and video signals in 200 to 300 words. Write a explanation comparing differences between PBX and VoIP.

  Evaluate all aspects of an organisation that uses e-commerce

The purpose of this assignment is to enable students to critically evaluate all aspects of an organisation that uses e-Commerce and e-Business and communicate these key issues through a written report based on the questions for case study released..

  How company can back up and protect network data

Develop the disaster plan for selected organization which includes how you would suggest company back up and protect network data.

  Explain transit systems for both avl and tsp

Outcome of this process must then be incorporated into ITS regional architecture. Are there plans to give ems vehicles with signal priority/pre-emption?

  Several network connections in the operation

By using a laptop computer along with a wireless connection into company’s local area network, you download a Web page from Internet. State all several network connections involved within this operation.

  Design the datagram for next header fields

Design the datagram and illustrate what contents of each of Next Header fields would contain. You do not have to look up actual numeric value, just explain what it would be referencing next.

  Outline the design of a wireless network

Outline the design of a wireless network to support user mobility over a wide area. Include in your answer a discussion of addressing, routing and the used of fixed versus ad hoc network access nodes or base stations.

  Action-connected to switch refuse to communicate network

PCs connected to the two wall jacks work fine, but the three connected to the switch refuse to communicate with the network. What could be wrong and what should she try next?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd