Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1.Describe the seven layers of the OSI network model. Using a wellknown networked application, give an example of what occurs at each level of the

1.Describe the seven layers of the OSI network model. Using a well‐known networked application, give an example of what occurs at each level of the model. Describe how the TCP/IP protocol suite maps onto the OSI model.
2. Network hardware typically consists of several different types of components: routers, switches, hubs, network interface cards, and cabling. Describe the functions o each of the aforementioned components, indicating where each operates in the OSI model and why.
3. TCP is rarely separated from IP, yet these are two distinct protocols. Describe the functions of TCP as separate from IP. Describe how UDP and TCP are different and why two different protocols are necessary over IP.
4. Describe the purpose and uses of VLANs as distinct from standard LAN technology. Consider a university campus network; describe a real‐world scenario where VLANs should be used.
5. A company requests and receives a range of IP addresses from IANA. The assigned range is
75.137.45.144/28. Explaining your work, answer the following:
a. How many machines can be directly connected to the Internet using this range?
b. If the company wishes to separate this network into two distinct and equally sized subnetworks, how would that be accomplished? How many machines may then be directly connected to the Internet?
c. Supposing that the company has many more machines than assigned IP addresses, how could the company provide access to Internet resources on all machines?

Step by Step Solution

There are 3 Steps involved in it

Step: 1

1Describe the seven layers of the OSI network model Using a wellknown networked application give an example of what occurs at each level of the model Describe how the TCPIP protocol suite maps onto th... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Principles Of Information Security

Authors: Michael E. Whitman, Herbert J. Mattord

7th Edition

035750643X, 978-0357506431

More Books

Students also viewed these Computer Network questions

Question

Am I surfing to avoid feelings of loneliness, stress, or a nger?

Answered: 1 week ago