Thursday, November 28, 2019

Ch 6 Notes Essay Example

Ch 6 Notes Essay Chapter 6 – Network Servers 6. 1. 1 Client/Server Relationships| | 1. | What is a server? | A host running a software application that provides info or services to other hosts connected to the network. | | 2. | What factor is crucial to enabling complex interactions? | They all use agreed standards and protocols | | 3. | What is a client? | Name given used a device that is running web client software | | 4. | What is the key characteristic of client/server systems? | Client sends a request to a server and the server responds by carrying out a function. | | 5. What is the most commonly used instance of a client/server system? | Combination of a web browser and web server | 6. 1. 1. 4 Activity| 6. 1. 2 Role of Protocols in Client/Server Communication| | 6. | What does HTTP define? | Hypertext transfer protocol It uses a method to transfer or convey info on the world wide web | | 7. | What is the transport protocol that manages the individual conversations between web servers and web clients? | TCP transmission control protocol | | 8. | What else does TCP provide? | It provides flow control and acknowledgement of packets exchanged bw host | | 9. What is the most common internetwork protocol? | Internet protocol IP | | 10. | What is IP responsible for? | Taking the formatted segments from TCP, assigning the the local addressing, and encapsulating them into packets 4 routing to destination host | | 11. | What governs how the bits are represented on the media, how the signals are sent over the media, and how they are interpreted by the receiving hosts? | We will write a custom essay sample on Ch 6 Notes specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Ch 6 Notes specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Ch 6 Notes specifically for you FOR ONLY $16.38 $13.9/page Hire Writer The standards and protocols | 6. 1. 3 TCP and UDP Transport Protocols| | 12. | What are the two most common transport protocols? | TCP(transmission control protocol) and UDP(user datagram protocol)| | 13. What protocol is used when an application requires acknowledgment that a message is delivered? | TCP | | 14. | What type of system is UDP? | Best effort delivery | 6. 1. 3. 4 Activity| 6. 1. 4 TCP/IP Port Numbers| | 15. | What is a port? | Numeric identifier within each segment that is used to keep track of specific conversations and destination services requested | | 16. | What is the port number for HTTP services? | Port 80 | | 17. | What is the port number for FTP services? | Port 21 | | 18. | How is the source port identified? | By a conversation bw 2 devices| | 19. | What is a socket? Combination of the source and destination ip address | | 20. | What is the purpose of the socket? | used to identify the server and service being request by the client| 6. 2. 1 Domain Name Service (DNS)| | 21. | What does a DNS server do? | Provides a way for hosts to use this name to request the IP address of a specific server| | 22. | What is the port number for DNS services? | 53 | 6. 2. 1. 3 Lab Activity| 6. 2. 2 Web Client and Servers| | 23. | What is the most commonly used markup language? | Hypertext Make up Language (HTML)| | 24. | Is HTTP a secure protocol? | No | | 25. | Where are requests for secure HTTP sent? Sent to port 443| 6. 2. 2. 2 Packet Tracer Activity| 6. 2. 3 FTP Clients and Servers| | 26. | What does FTP do? | Provides an easy method to transfer files 4rm one compute to another. | | 27. | What port numbers are associated with FTP? | Port 21 and port 20 | 6. 2. 3. 2 GUI FTP Client| 6. 2. 3. 3 Lab Activity| 6. 2. 4 Email Clients and Servers| | 28. | What is one of the most popular client/server applications on the Internet? | Email | | 29. | What are some of the protocols used in processing email? | | | 30. | What is SMTP used for? | Used by an email client to send messa ges to its local email server. | 31. | What port number is associated with SMTP requests? | Port 25 | | 32. | What does SMTP stand for? | Simple mail transfer protocol | | 33. | What does the acronym POP stand for? | Post office protocol | | 34. | What port number is associated with POP3? | Port 110 | | 35. | What is POP3 used for? | The client connects to the email server; the messages are downloaded to the client. | | 36. | What is SMTP used for? | Used by an email client to send messaged to its local email server| | 37. | What port number is associated with IMAP? | Port 143| | 38. | What is the difference between POP3 and IMAP4? | | 6. . 4. 4 Lab Activity| 6. 2. 5 IM Clients and Servers| | 39. | What is one of the most popular communication tools today? | IM (instant messaging) | | 40. | Can you transfer video, music, and speech files using IM? | Yes | 6. 2. 6 Voice Clients and Servers| | 41. | What is IP telephony? | Client that uses peer-to-peer technology similar to that used by IM. | | 42. | How do you get started using Internet telephone? | Download the client software 4rm one of the companies that provide the service. | 6. 2. 7 Port Numbers| | 43. | How many ports are available? | 1-1023| | 44. | What are the three categories of ports? Well-known, registered, and private ports. | | 45. | Who assigns and manages ports? | | | 46. | What are well-known ports? | Destination ports that are associated with common network applications| | 47. | What is the range of port numbers for well-known ports? | | | 48. | What port is assigned for Telnet? | | 6. 2. 7. 2 Activity| 6. 3. 1 Protocol Interaction| | 49. | What does successful communication between hosts require? | Interaction bw a numbers of protocols. | | 50. | What is a protocol stack? | Interaction bw protocols | | 51. | What are the benefits of a layered model? | 1. Assist protocol design 2. Fosters competition 3. Prevents technology or capability changes in one layer 4rm affecting other layers above and below 4. Provides a common language to describe networking functions and capabilities | | 52. | What are the layers of the TCP/IP model? | | | 53. | Which layer of the TCP/IP model is responsible for end-to-end delivery services? | | | 54. | Where is error checking information found? | | 6. 3. 2. 3 Activity| 6. 3. 3 Open Systems Interconnect Model| | 55. | Who developed the OSI model? | International organization for standardization (ISO) | | 56. When was the OSI model developed? | 1984 | | 57. | How many layers are there in the OSI model? | 7| | 58. | What are the layers of the OSI model? | Application, presentation, session, transport, network, data link, physical. | | 59. | What is an acronym for helping to remember the OSI layer? | All People Seem To Need Data Processing| | 60. | Which layer encrypts and decrypts data and compresses and deco mpresses data? | Presentation| | 61. | Which layer detects and corrects frame transmit errors? | Data link| 6. 3. 3. 3 Activity | 6. 3. 3. 4 Activity | 6. 3. 3. 5 Packet Tracer Activity| 6. 5. 1. 1 Chapter Quiz|

Sunday, November 24, 2019

Persuasive Essay on Gun Control

Persuasive Essay on Gun Control Persuasive Essay on Gun Control English teachers encourage students to look for controversial issues in society on which to base a persuasive essay. The reason is that the teacher wants a topic that can be easily debated on either side of the issue and that brings forth strong emotions from both sides. The purpose is to help students organize and express ideas in a clear and coherent manner. One such controversial issue is gun control. One side of the argument is that the policies for owning and using guns should be stricter. One who holds such a position might argue as follows: It is very unfortunate that people are losing their loved ones due to the misuse of guns. While guns should be used to enhance security of people in a society, the same guns have been using in perpetuating crimes that have worsened the security status of many countries. In order to eradicate the issue of insecurity, guns should be used only when necessary. In this case there is a need to put in place policies that will ensure that gun use is properly controlled. In addition to this example are suggestions below on how to write a persuasive essay on gun control. Suggestions on How to Write a Persuasive Essay on Gun Control: First, determine what your position is on gun control. Next, plan the major arguments in support of your position. Be sure to offer explanations, facts and statistics, as well as examples. You can even include anecdotal material. Do not forget the â€Å"so what† factor. In other words, make certain to get the reader to see why it is important to that individual’s personal life. Secondly, when preparing a persuasive essay on gun control, the writer should explain the reason why guns are in the hands of the people. Constitutional rights can be discussed as to the original intent and modern interpretation of those rights. In addition, the writer can point out reasons why people should respect the sanctity of life and the right of every human being to be alive, regardless of ones stance on regulations involving gun control. Next, the writer can help the reader to explore whether everyone should have a right to own and operate a gun. For example, should criminals be permitted to own and use a fire arm? What about individuals with mental health issues? While every person is entitled to security, not all people should be issued guns. This is the reason why governments put into place stringent measures for applying for and purchasing weapons. Additionally, the writer can remind the reader that cooperation between civilians and the police is important in following the due process for acquiring guns. Regulations and the need for regulations can be explored in this context. Preparing a persuasive essay on gun control is not as easy as one may think. Emotions run high. On one hand is the need to protect oneself and even ones country. Furthermore, some individuals use weapons for sport, such as range shooting or hunting. However, there are safety issues where someone acts out anger or frustration by pulling a gun and shooting the other person. In addition to that are issues with criminals. Some say that guns should be better monitored to keep them out of the hands of those who would harm society, while others argue that those who break the law will obtain guns anyway. However, regardless of what side of the issue you choose to support, you will need to make your position clear and your arguments strong. Moreover, you will need to convey your ideas in a clear and compelling manner. Feel free to succeed in persuasive essay writing with !

Thursday, November 21, 2019

The Geology of Dagger Mountain at big bend national park Term Paper

The Geology of Dagger Mountain at big bend national park - Term Paper Example Several cretaceous sedimentary rocks are present and they include buda, boquillas, santa Elena, and del rio. The site also consists of two faults which include the basin and range high angel fault and Laramide thrust fault which create a graben. The Dagger Mountain has an elevation of 4173 feet and 1300 feet of relief. The anticline of the mountain is trending at north- northwest within the Sierra del Carmen. There are a number of reverse faults and folds. They are located on the eastern side of cordilleran orogen. On the eastern Trans-pecos province, there are mafic sills found near the Dagger Mountain. The mafic sills are made up of magmas that crystallized after cordilleran contraction and at the beginning of range and basin extension (Cloud et al 121). The anticline of Dagger Mountain is one of the laramide orogen (Cullen et al 105). This is a period of mountain building which started seventy to eighty million years ago in the late cretaceous. It then ended thirty to fifty five million years ago. Laramide orogen was triggered by subduction of tectonic plate and took place in sequence of pulses. The intrusions of Sierra del Carmen towards the Trans-Pecos province, occurred during the mafic and alkali rich felsic lava flows, and the pyroclastic flows (Cullen et al 106). The lava flow formed a northwest trending belt which intruded the north part of Mexico. This belt holds the Dagger Mountain. At the end of laramade orogeny, most of the magmas were produced by the mantle upwelling. The production of magmas was triggered by the foundering subduction of farallon plates. The field trip made to the big bend national park was based on the study and observation of dagger mountain’s cretaceous sedimentary rocks as well as igneous intrusions. The following were some of the discovery made in the field: There are a number of cretaceous sedimentary rocks discovered within and around