SlideShare a Scribd company logo
For this Discussion, respond to the following:
Discuss the purpose of subnetting. What does CIDR stand for
and mean?
Discuss the use of ARP, TCP, UDP, FTP, HTTP, and Telnet.
How does TCP ensure reliable delivery? Name a few TCP
protocols. What is TCP's "counterpart" that does not ensure
reliable delivery? Name a few of these protocols.
What is the purpose of subnetting- Subnetting a network
resolves network congestion. for example, if all computers on
the network are downloading big files the network can
overwhelm the network. Subnetting divides the network into
two or more networks. What does CIDR stand for and mean?
CIDR means Classless Inter-Domain Routing. This allows for
you to add a specification on the IP address that allows you to
put specifications on the number of bits that make up the
networking portion.
What is the use of ARP, TCP, UDP, FTP, HTTP, and Telnet?
ARP means Address Resolution Protocol, this is a networking
layer protocol that turns IP addresses into physical address also
known as MAC address. TCP stands for Transmission Control
Protocol this allows one computer to talk to another computer
through compiling packets of data and sending them to the right
location. UDP stands for User Datagram Protocol. This is a
connectionless protocol because it doesn’t require a virtual
circuit to be established before any data transfer occurs. UDP
provides two services not provided by the IP layer. It provides
port numbers to help distinguish different user requests and a
checksum capability to verify that the data arrived intact. FTP
stands for File Transfer Protocol, this one is self-explanatory
this is the standard for transferring files over the internet. HTTP
means Hypertext Transfer Protocol, the communications
protocol used to connect to Web servers on the Internet or on a
local network (intranet). Its primary function is to establish a
connection with the server and send HTML pages back to the
user's browser. Telnet is the method that allows connecting to a
remote computer over the Internet and using programs and data
as if they were on your local machine
How does TCP ensure reliable delivery? Name a few TCP
protocols. What is TCP's "counterpart" that does not ensure
reliable delivery? Name a few of these protocols.
Transmission control protocol ensures correct delivery by using
ACKs when the packets are received. This is almost like sonar,
a ping is released and when it bounces back it tells you the
information on the ocean floor. Examples of TCP are HTTP,
FTP,POP3,SMTP,SNMP. UPD does have any type of delivery
ensure method. An example of a UPD is DNS (Domain Name
Servers).
*******NEED HELP RESPONDING TO THIS POST *******

More Related Content

More from DustiBuckner14

What are the techniques in handling categorical attributesHow.docx
What are the techniques in handling categorical attributesHow.docxWhat are the techniques in handling categorical attributesHow.docx
What are the techniques in handling categorical attributesHow.docx
DustiBuckner14
 
University of the CumberlandsSchool of Computer & Information .docx
University of the CumberlandsSchool of Computer & Information .docxUniversity of the CumberlandsSchool of Computer & Information .docx
University of the CumberlandsSchool of Computer & Information .docx
DustiBuckner14
 
Theresa and Mike fully support creating a code of conduct for th.docx
Theresa and Mike fully support creating a code of conduct for th.docxTheresa and Mike fully support creating a code of conduct for th.docx
Theresa and Mike fully support creating a code of conduct for th.docx
DustiBuckner14
 
Unit VII 1. Suppose a firm uses sugar in a product tha.docx
Unit VII         1. Suppose a firm uses sugar in a product tha.docxUnit VII         1. Suppose a firm uses sugar in a product tha.docx
Unit VII 1. Suppose a firm uses sugar in a product tha.docx
DustiBuckner14
 
Title PageThis spreadsheet supports STUDENT analysis of the case .docx
Title PageThis spreadsheet supports STUDENT analysis of the case .docxTitle PageThis spreadsheet supports STUDENT analysis of the case .docx
Title PageThis spreadsheet supports STUDENT analysis of the case .docx
DustiBuckner14
 
Title If a compensation system works well for one business, that .docx
Title If a compensation system works well for one business, that .docxTitle If a compensation system works well for one business, that .docx
Title If a compensation system works well for one business, that .docx
DustiBuckner14
 
Review the Article Below Keller, J. G., Miller, C., LasDulce, C.docx
Review the Article Below Keller, J. G., Miller, C., LasDulce, C.docxReview the Article Below Keller, J. G., Miller, C., LasDulce, C.docx
Review the Article Below Keller, J. G., Miller, C., LasDulce, C.docx
DustiBuckner14
 
Teachers reach diverse learners by scaffolding instruction in ways t.docx
Teachers reach diverse learners by scaffolding instruction in ways t.docxTeachers reach diverse learners by scaffolding instruction in ways t.docx
Teachers reach diverse learners by scaffolding instruction in ways t.docx
DustiBuckner14
 
ScenarioThe HIT Innovation Steering Committee of a large.docx
ScenarioThe HIT Innovation Steering Committee of a large.docxScenarioThe HIT Innovation Steering Committee of a large.docx
ScenarioThe HIT Innovation Steering Committee of a large.docx
DustiBuckner14
 
Space ... the final frontier.  So, as I am sure everyone knows, .docx
Space ... the final frontier.  So, as I am sure everyone knows, .docxSpace ... the final frontier.  So, as I am sure everyone knows, .docx
Space ... the final frontier.  So, as I am sure everyone knows, .docx
DustiBuckner14
 
The Internal EnvironmentInstitutionStudent’s name.docx
The Internal EnvironmentInstitutionStudent’s name.docxThe Internal EnvironmentInstitutionStudent’s name.docx
The Internal EnvironmentInstitutionStudent’s name.docx
DustiBuckner14
 
THE RESEARCH PROPOSAL BUS8100 8Chapter 2 - Literature ReviewTh.docx
THE RESEARCH PROPOSAL BUS8100 8Chapter 2 - Literature ReviewTh.docxTHE RESEARCH PROPOSAL BUS8100 8Chapter 2 - Literature ReviewTh.docx
THE RESEARCH PROPOSAL BUS8100 8Chapter 2 - Literature ReviewTh.docx
DustiBuckner14
 
Take a moment to look over the prompts below and formulate a conce.docx
Take a moment to look over the prompts below and formulate a conce.docxTake a moment to look over the prompts below and formulate a conce.docx
Take a moment to look over the prompts below and formulate a conce.docx
DustiBuckner14
 
ScenarioA large integrated healthcare system recognizes the .docx
ScenarioA large integrated healthcare system recognizes the .docxScenarioA large integrated healthcare system recognizes the .docx
ScenarioA large integrated healthcare system recognizes the .docx
DustiBuckner14
 
REPLY A KASEY CI was taught at an early age that women are to be.docx
REPLY A KASEY CI was taught at an early age that women are to be.docxREPLY A KASEY CI was taught at an early age that women are to be.docx
REPLY A KASEY CI was taught at an early age that women are to be.docx
DustiBuckner14
 
Relationship of Transformational and Transactional Leadershi.docx
Relationship of Transformational and Transactional Leadershi.docxRelationship of Transformational and Transactional Leadershi.docx
Relationship of Transformational and Transactional Leadershi.docx
DustiBuckner14
 
Since you cited the CBS video, I am sure you watch the section with .docx
Since you cited the CBS video, I am sure you watch the section with .docxSince you cited the CBS video, I am sure you watch the section with .docx
Since you cited the CBS video, I am sure you watch the section with .docx
DustiBuckner14
 
ropiateswriters•Posted by uKrisleigh81How it all b.docx
ropiateswriters•Posted by             uKrisleigh81How it all b.docxropiateswriters•Posted by             uKrisleigh81How it all b.docx
ropiateswriters•Posted by uKrisleigh81How it all b.docx
DustiBuckner14
 
Question #1 Please choose ONE of the following to make an origi.docx
Question #1 Please choose ONE of the following to make an origi.docxQuestion #1 Please choose ONE of the following to make an origi.docx
Question #1 Please choose ONE of the following to make an origi.docx
DustiBuckner14
 
Running head WORKFLOW ANALYSIS1Deliverabl.docx
Running head WORKFLOW ANALYSIS1Deliverabl.docxRunning head WORKFLOW ANALYSIS1Deliverabl.docx
Running head WORKFLOW ANALYSIS1Deliverabl.docx
DustiBuckner14
 

More from DustiBuckner14 (20)

What are the techniques in handling categorical attributesHow.docx
What are the techniques in handling categorical attributesHow.docxWhat are the techniques in handling categorical attributesHow.docx
What are the techniques in handling categorical attributesHow.docx
 
University of the CumberlandsSchool of Computer & Information .docx
University of the CumberlandsSchool of Computer & Information .docxUniversity of the CumberlandsSchool of Computer & Information .docx
University of the CumberlandsSchool of Computer & Information .docx
 
Theresa and Mike fully support creating a code of conduct for th.docx
Theresa and Mike fully support creating a code of conduct for th.docxTheresa and Mike fully support creating a code of conduct for th.docx
Theresa and Mike fully support creating a code of conduct for th.docx
 
Unit VII 1. Suppose a firm uses sugar in a product tha.docx
Unit VII         1. Suppose a firm uses sugar in a product tha.docxUnit VII         1. Suppose a firm uses sugar in a product tha.docx
Unit VII 1. Suppose a firm uses sugar in a product tha.docx
 
Title PageThis spreadsheet supports STUDENT analysis of the case .docx
Title PageThis spreadsheet supports STUDENT analysis of the case .docxTitle PageThis spreadsheet supports STUDENT analysis of the case .docx
Title PageThis spreadsheet supports STUDENT analysis of the case .docx
 
Title If a compensation system works well for one business, that .docx
Title If a compensation system works well for one business, that .docxTitle If a compensation system works well for one business, that .docx
Title If a compensation system works well for one business, that .docx
 
Review the Article Below Keller, J. G., Miller, C., LasDulce, C.docx
Review the Article Below Keller, J. G., Miller, C., LasDulce, C.docxReview the Article Below Keller, J. G., Miller, C., LasDulce, C.docx
Review the Article Below Keller, J. G., Miller, C., LasDulce, C.docx
 
Teachers reach diverse learners by scaffolding instruction in ways t.docx
Teachers reach diverse learners by scaffolding instruction in ways t.docxTeachers reach diverse learners by scaffolding instruction in ways t.docx
Teachers reach diverse learners by scaffolding instruction in ways t.docx
 
ScenarioThe HIT Innovation Steering Committee of a large.docx
ScenarioThe HIT Innovation Steering Committee of a large.docxScenarioThe HIT Innovation Steering Committee of a large.docx
ScenarioThe HIT Innovation Steering Committee of a large.docx
 
Space ... the final frontier.  So, as I am sure everyone knows, .docx
Space ... the final frontier.  So, as I am sure everyone knows, .docxSpace ... the final frontier.  So, as I am sure everyone knows, .docx
Space ... the final frontier.  So, as I am sure everyone knows, .docx
 
The Internal EnvironmentInstitutionStudent’s name.docx
The Internal EnvironmentInstitutionStudent’s name.docxThe Internal EnvironmentInstitutionStudent’s name.docx
The Internal EnvironmentInstitutionStudent’s name.docx
 
THE RESEARCH PROPOSAL BUS8100 8Chapter 2 - Literature ReviewTh.docx
THE RESEARCH PROPOSAL BUS8100 8Chapter 2 - Literature ReviewTh.docxTHE RESEARCH PROPOSAL BUS8100 8Chapter 2 - Literature ReviewTh.docx
THE RESEARCH PROPOSAL BUS8100 8Chapter 2 - Literature ReviewTh.docx
 
Take a moment to look over the prompts below and formulate a conce.docx
Take a moment to look over the prompts below and formulate a conce.docxTake a moment to look over the prompts below and formulate a conce.docx
Take a moment to look over the prompts below and formulate a conce.docx
 
ScenarioA large integrated healthcare system recognizes the .docx
ScenarioA large integrated healthcare system recognizes the .docxScenarioA large integrated healthcare system recognizes the .docx
ScenarioA large integrated healthcare system recognizes the .docx
 
REPLY A KASEY CI was taught at an early age that women are to be.docx
REPLY A KASEY CI was taught at an early age that women are to be.docxREPLY A KASEY CI was taught at an early age that women are to be.docx
REPLY A KASEY CI was taught at an early age that women are to be.docx
 
Relationship of Transformational and Transactional Leadershi.docx
Relationship of Transformational and Transactional Leadershi.docxRelationship of Transformational and Transactional Leadershi.docx
Relationship of Transformational and Transactional Leadershi.docx
 
Since you cited the CBS video, I am sure you watch the section with .docx
Since you cited the CBS video, I am sure you watch the section with .docxSince you cited the CBS video, I am sure you watch the section with .docx
Since you cited the CBS video, I am sure you watch the section with .docx
 
ropiateswriters•Posted by uKrisleigh81How it all b.docx
ropiateswriters•Posted by             uKrisleigh81How it all b.docxropiateswriters•Posted by             uKrisleigh81How it all b.docx
ropiateswriters•Posted by uKrisleigh81How it all b.docx
 
Question #1 Please choose ONE of the following to make an origi.docx
Question #1 Please choose ONE of the following to make an origi.docxQuestion #1 Please choose ONE of the following to make an origi.docx
Question #1 Please choose ONE of the following to make an origi.docx
 
Running head WORKFLOW ANALYSIS1Deliverabl.docx
Running head WORKFLOW ANALYSIS1Deliverabl.docxRunning head WORKFLOW ANALYSIS1Deliverabl.docx
Running head WORKFLOW ANALYSIS1Deliverabl.docx
 

For this Discussion, respond to the followingDiscuss the purp

  • 1. For this Discussion, respond to the following: Discuss the purpose of subnetting. What does CIDR stand for and mean? Discuss the use of ARP, TCP, UDP, FTP, HTTP, and Telnet. How does TCP ensure reliable delivery? Name a few TCP protocols. What is TCP's "counterpart" that does not ensure reliable delivery? Name a few of these protocols. What is the purpose of subnetting- Subnetting a network resolves network congestion. for example, if all computers on the network are downloading big files the network can overwhelm the network. Subnetting divides the network into two or more networks. What does CIDR stand for and mean? CIDR means Classless Inter-Domain Routing. This allows for you to add a specification on the IP address that allows you to put specifications on the number of bits that make up the networking portion. What is the use of ARP, TCP, UDP, FTP, HTTP, and Telnet? ARP means Address Resolution Protocol, this is a networking layer protocol that turns IP addresses into physical address also known as MAC address. TCP stands for Transmission Control Protocol this allows one computer to talk to another computer through compiling packets of data and sending them to the right location. UDP stands for User Datagram Protocol. This is a connectionless protocol because it doesn’t require a virtual circuit to be established before any data transfer occurs. UDP provides two services not provided by the IP layer. It provides
  • 2. port numbers to help distinguish different user requests and a checksum capability to verify that the data arrived intact. FTP stands for File Transfer Protocol, this one is self-explanatory this is the standard for transferring files over the internet. HTTP means Hypertext Transfer Protocol, the communications protocol used to connect to Web servers on the Internet or on a local network (intranet). Its primary function is to establish a connection with the server and send HTML pages back to the user's browser. Telnet is the method that allows connecting to a remote computer over the Internet and using programs and data as if they were on your local machine How does TCP ensure reliable delivery? Name a few TCP protocols. What is TCP's "counterpart" that does not ensure reliable delivery? Name a few of these protocols. Transmission control protocol ensures correct delivery by using ACKs when the packets are received. This is almost like sonar, a ping is released and when it bounces back it tells you the information on the ocean floor. Examples of TCP are HTTP, FTP,POP3,SMTP,SNMP. UPD does have any type of delivery ensure method. An example of a UPD is DNS (Domain Name Servers). *******NEED HELP RESPONDING TO THIS POST *******