Deck 3: Using Network Communication Protocols

ملء الشاشة (f)
exit full mode
سؤال
For two computers to fully communicate, they must use the same protocol.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
____ was the first protocol developed as a means for IBM, DEC, and other host computers to communicate.

A)NCP
B)TCP
C)IP
D)NetBEUI
سؤال
You can assign a network number to a computer or any other host on the network.
سؤال
If you have generated the IP address 165.100.18.44/18 by using CIDR, what is the number of bits needed for the host identifier?

A)14
B)18
C)44
D)100
سؤال
The required header length of a TCP frame must be divisible by 32.
سؤال
Each network node has a ____-bit address, which, when used with its 48-bit MAC address, enables network communications and accurate delivery of a packet.

A)16
B)32
C)48
D)64
سؤال
AppleTalk Phase II supports as many as ____ nodes on a single logical network.

A)100
B)150
C)253
D)300
سؤال
____ enables a packet to reach different subnetworks on a LAN and different networks on a WAN.

A)IP
B)TCP
C)DNS
D)FTP
سؤال
Packets that begin with ____ in the first octet are used for network testing.

A)1
B)126
C)127
D)128
سؤال
FTP cannot transfer a portion of a file or records within a file.
سؤال
The ____ field in a TCP frame header consists of the number of bytes that can be transmitted before the sender receives an acknowledgment of receipt.

A)flags/control
B)checksum
C)padding
D)window
سؤال
TCP/IP consists of nearly ____ nonproprietary protocols that interconnect computer systems efficiently and reliably.

A)100
B)200
C)300
D)500
سؤال
Telnet uses TCP port ____ at the sender and receiver for dedicated communications.

A)21
B)22
C)23
D)80
سؤال
The ____ protocol is connectionless and is intended for the transfer of small files when data transmission errors are not critical and there is no need for security.

A)TFTP
B)NFS
C)NCP
D)FTP
سؤال
The Network layer equivalent in TCP/IP is TCP.
سؤال
____, specified in RFC 793,was initially designed for point-to-point communications between computers on the same network.

A)IP
B)TCP
C)NCP
D)UDP
سؤال
A ____ communication sends a message to all points on a specific network.

A)multicast
B)unicast
C)simulcast
D)broadcast
سؤال
The ____ protocol is used by network-monitoring applications that do not require the same level of reliability as offered by TCP.

A)IP
B)UDP
C)FTP
D)NCP
سؤال
The ____ field in an IP packet header contains information that prevents a packet from continuously circulating around a network.

A)flags
B)fragment Offset
C)time to live (TTL)
D)protocol
سؤال
Today, ____ remains the LAN protocol of preference for NetWare 6 and above.

A)IPX/SPX
B)XNS
C)NetBEUI
D)TCP/IP
سؤال
Identify four capabilities included in the properties of a LAN protocol.
سؤال
The _________________________ is a TCP/IP service that converts a computer or domain name to an IP address or that converts an IP address to a computer or domain name.
سؤال
What is IP addressing and why is it important?
سؤال
The number of data bytes transmitted in a frame is called the ____________________ window.
سؤال
A ____ is a logical grouping of network resources such as computers, printers, and network devices.

A)container
B)class
C)range
D)domain
سؤال
What are the disadvantages and advantages of UDP (User Datagram Protocol)?
سؤال
________________________________________ enables remote communications to networks, intranets, virtual private networks, and extranets by way of the Internet.
سؤال
Describe how zones help organize the tables used by DNS servers.
سؤال
Identify five advantages of TCP/IP (Transmission Control Protocol/Internet Protocol)
سؤال
____________________ is the time it takes for networked information to travel from the transmitting device to the receiving device.
سؤال
The ____ protocol enables the sending node to obtain the MAC addresses of the intended recipient before packets are sent.

A)SNMP
B)DHCP
C)ARP
D)SMTP
سؤال
When a TCP segment is formatted with additional IP header information, the entire unit is called a(n)____________________.
سؤال
There are 13 ____ servers on the Internet that are used to find TLDs, for example, .com or .net.

A)parent
B)root
C)primary DNS
D)secondary DNS
سؤال
____ enables the establishment of a Web connection and provides for the exchange of resources, such as displaying Web pages in your browser.

A)Telnet
B)HTTP
C)FTP
D)SMTP
سؤال
What are the advantages and disadvantages of having multiple LAN protocols?
سؤال
The ____ protocol sets up the fastest communications route between different kinds of telecommunications-based WANs.

A)PPP
B)PPTP
C)SS7
D)L2TP
سؤال
The ____ protocol supports connection authentication and encryption for security.

A)SLIP
B)NCP
C)CSLIP
D)PPP
سؤال
Describe an advantage of FTP over TFTP and NFS.
سؤال
How are Ethernet and token ring access methods facilitated in AppleTalk Phase II networks?
سؤال
What are five prominent features of IPv6 (IP version 6)?
سؤال
Match between columns
protocol developed by Novell for the NetWare operating system.
Internetwork Package Exchange (IPX)
protocol developed by Novell for the NetWare operating system.
AppleTalk
protocol developed by Novell for the NetWare operating system.
TCP port
protocol developed by Novell for the NetWare operating system.
checksum
protocol developed by Novell for the NetWare operating system.
dotted decimal notation address
protocol developed by Novell for the NetWare operating system.
anycast packet
protocol developed by Novell for the NetWare operating system.
terminal emulation
protocol developed by Novell for the NetWare operating system.
Simple Mail Transfer Protocol (SMTP)
protocol developed by Novell for the NetWare operating system.
namespace
logical area on a network that contains a list of named objects and performs name resolution.
Internetwork Package Exchange (IPX)
logical area on a network that contains a list of named objects and performs name resolution.
AppleTalk
logical area on a network that contains a list of named objects and performs name resolution.
TCP port
logical area on a network that contains a list of named objects and performs name resolution.
checksum
logical area on a network that contains a list of named objects and performs name resolution.
dotted decimal notation address
logical area on a network that contains a list of named objects and performs name resolution.
anycast packet
logical area on a network that contains a list of named objects and performs name resolution.
terminal emulation
logical area on a network that contains a list of named objects and performs name resolution.
Simple Mail Transfer Protocol (SMTP)
logical area on a network that contains a list of named objects and performs name resolution.
namespace
contains a destination address that is associated with multiple interfaces, usually on different nodes.
Internetwork Package Exchange (IPX)
contains a destination address that is associated with multiple interfaces, usually on different nodes.
AppleTalk
contains a destination address that is associated with multiple interfaces, usually on different nodes.
TCP port
contains a destination address that is associated with multiple interfaces, usually on different nodes.
checksum
contains a destination address that is associated with multiple interfaces, usually on different nodes.
dotted decimal notation address
contains a destination address that is associated with multiple interfaces, usually on different nodes.
anycast packet
contains a destination address that is associated with multiple interfaces, usually on different nodes.
terminal emulation
contains a destination address that is associated with multiple interfaces, usually on different nodes.
Simple Mail Transfer Protocol (SMTP)
contains a destination address that is associated with multiple interfaces, usually on different nodes.
namespace
involves using software to make a computer, such as a PC, behave as though it were a terminal.
Internetwork Package Exchange (IPX)
involves using software to make a computer, such as a PC, behave as though it were a terminal.
AppleTalk
involves using software to make a computer, such as a PC, behave as though it were a terminal.
TCP port
involves using software to make a computer, such as a PC, behave as though it were a terminal.
checksum
involves using software to make a computer, such as a PC, behave as though it were a terminal.
dotted decimal notation address
involves using software to make a computer, such as a PC, behave as though it were a terminal.
anycast packet
involves using software to make a computer, such as a PC, behave as though it were a terminal.
terminal emulation
involves using software to make a computer, such as a PC, behave as though it were a terminal.
Simple Mail Transfer Protocol (SMTP)
involves using software to make a computer, such as a PC, behave as though it were a terminal.
namespace
provides an alternative to FTP for sending a file from one computer system to another.
Internetwork Package Exchange (IPX)
provides an alternative to FTP for sending a file from one computer system to another.
AppleTalk
provides an alternative to FTP for sending a file from one computer system to another.
TCP port
provides an alternative to FTP for sending a file from one computer system to another.
checksum
provides an alternative to FTP for sending a file from one computer system to another.
dotted decimal notation address
provides an alternative to FTP for sending a file from one computer system to another.
anycast packet
provides an alternative to FTP for sending a file from one computer system to another.
terminal emulation
provides an alternative to FTP for sending a file from one computer system to another.
Simple Mail Transfer Protocol (SMTP)
provides an alternative to FTP for sending a file from one computer system to another.
namespace
16-bit cyclic redundancy check based on length of all TCP header fields and the data payload field
Internetwork Package Exchange (IPX)
16-bit cyclic redundancy check based on length of all TCP header fields and the data payload field
AppleTalk
16-bit cyclic redundancy check based on length of all TCP header fields and the data payload field
TCP port
16-bit cyclic redundancy check based on length of all TCP header fields and the data payload field
checksum
16-bit cyclic redundancy check based on length of all TCP header fields and the data payload field
dotted decimal notation address
16-bit cyclic redundancy check based on length of all TCP header fields and the data payload field
anycast packet
16-bit cyclic redundancy check based on length of all TCP header fields and the data payload field
terminal emulation
16-bit cyclic redundancy check based on length of all TCP header fields and the data payload field
Simple Mail Transfer Protocol (SMTP)
16-bit cyclic redundancy check based on length of all TCP header fields and the data payload field
namespace
IP address format
Internetwork Package Exchange (IPX)
IP address format
AppleTalk
IP address format
TCP port
IP address format
checksum
IP address format
dotted decimal notation address
IP address format
anycast packet
IP address format
terminal emulation
IP address format
Simple Mail Transfer Protocol (SMTP)
IP address format
namespace
peer-to-peer network protocol especially designed for Macintosh computers.
Internetwork Package Exchange (IPX)
peer-to-peer network protocol especially designed for Macintosh computers.
AppleTalk
peer-to-peer network protocol especially designed for Macintosh computers.
TCP port
peer-to-peer network protocol especially designed for Macintosh computers.
checksum
peer-to-peer network protocol especially designed for Macintosh computers.
dotted decimal notation address
peer-to-peer network protocol especially designed for Macintosh computers.
anycast packet
peer-to-peer network protocol especially designed for Macintosh computers.
terminal emulation
peer-to-peer network protocol especially designed for Macintosh computers.
Simple Mail Transfer Protocol (SMTP)
peer-to-peer network protocol especially designed for Macintosh computers.
namespace
similar to a virtual circuit between two communicating processes on two different nodes.
Internetwork Package Exchange (IPX)
similar to a virtual circuit between two communicating processes on two different nodes.
AppleTalk
similar to a virtual circuit between two communicating processes on two different nodes.
TCP port
similar to a virtual circuit between two communicating processes on two different nodes.
checksum
similar to a virtual circuit between two communicating processes on two different nodes.
dotted decimal notation address
similar to a virtual circuit between two communicating processes on two different nodes.
anycast packet
similar to a virtual circuit between two communicating processes on two different nodes.
terminal emulation
similar to a virtual circuit between two communicating processes on two different nodes.
Simple Mail Transfer Protocol (SMTP)
similar to a virtual circuit between two communicating processes on two different nodes.
namespace
سؤال
How is the Dynamic Host Configuration Protocol (DHCP)used?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 3: Using Network Communication Protocols
1
For two computers to fully communicate, they must use the same protocol.
True
2
____ was the first protocol developed as a means for IBM, DEC, and other host computers to communicate.

A)NCP
B)TCP
C)IP
D)NetBEUI
A
3
You can assign a network number to a computer or any other host on the network.
False
4
If you have generated the IP address 165.100.18.44/18 by using CIDR, what is the number of bits needed for the host identifier?

A)14
B)18
C)44
D)100
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
The required header length of a TCP frame must be divisible by 32.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
Each network node has a ____-bit address, which, when used with its 48-bit MAC address, enables network communications and accurate delivery of a packet.

A)16
B)32
C)48
D)64
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
AppleTalk Phase II supports as many as ____ nodes on a single logical network.

A)100
B)150
C)253
D)300
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
____ enables a packet to reach different subnetworks on a LAN and different networks on a WAN.

A)IP
B)TCP
C)DNS
D)FTP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
Packets that begin with ____ in the first octet are used for network testing.

A)1
B)126
C)127
D)128
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
FTP cannot transfer a portion of a file or records within a file.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
The ____ field in a TCP frame header consists of the number of bytes that can be transmitted before the sender receives an acknowledgment of receipt.

A)flags/control
B)checksum
C)padding
D)window
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
TCP/IP consists of nearly ____ nonproprietary protocols that interconnect computer systems efficiently and reliably.

A)100
B)200
C)300
D)500
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
Telnet uses TCP port ____ at the sender and receiver for dedicated communications.

A)21
B)22
C)23
D)80
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
The ____ protocol is connectionless and is intended for the transfer of small files when data transmission errors are not critical and there is no need for security.

A)TFTP
B)NFS
C)NCP
D)FTP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
The Network layer equivalent in TCP/IP is TCP.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
____, specified in RFC 793,was initially designed for point-to-point communications between computers on the same network.

A)IP
B)TCP
C)NCP
D)UDP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
A ____ communication sends a message to all points on a specific network.

A)multicast
B)unicast
C)simulcast
D)broadcast
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
The ____ protocol is used by network-monitoring applications that do not require the same level of reliability as offered by TCP.

A)IP
B)UDP
C)FTP
D)NCP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
The ____ field in an IP packet header contains information that prevents a packet from continuously circulating around a network.

A)flags
B)fragment Offset
C)time to live (TTL)
D)protocol
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
Today, ____ remains the LAN protocol of preference for NetWare 6 and above.

A)IPX/SPX
B)XNS
C)NetBEUI
D)TCP/IP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
Identify four capabilities included in the properties of a LAN protocol.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
The _________________________ is a TCP/IP service that converts a computer or domain name to an IP address or that converts an IP address to a computer or domain name.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
What is IP addressing and why is it important?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
The number of data bytes transmitted in a frame is called the ____________________ window.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
A ____ is a logical grouping of network resources such as computers, printers, and network devices.

A)container
B)class
C)range
D)domain
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
What are the disadvantages and advantages of UDP (User Datagram Protocol)?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
________________________________________ enables remote communications to networks, intranets, virtual private networks, and extranets by way of the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
Describe how zones help organize the tables used by DNS servers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
Identify five advantages of TCP/IP (Transmission Control Protocol/Internet Protocol)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
____________________ is the time it takes for networked information to travel from the transmitting device to the receiving device.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
The ____ protocol enables the sending node to obtain the MAC addresses of the intended recipient before packets are sent.

A)SNMP
B)DHCP
C)ARP
D)SMTP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
When a TCP segment is formatted with additional IP header information, the entire unit is called a(n)____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
There are 13 ____ servers on the Internet that are used to find TLDs, for example, .com or .net.

A)parent
B)root
C)primary DNS
D)secondary DNS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
____ enables the establishment of a Web connection and provides for the exchange of resources, such as displaying Web pages in your browser.

A)Telnet
B)HTTP
C)FTP
D)SMTP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
What are the advantages and disadvantages of having multiple LAN protocols?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
The ____ protocol sets up the fastest communications route between different kinds of telecommunications-based WANs.

A)PPP
B)PPTP
C)SS7
D)L2TP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
The ____ protocol supports connection authentication and encryption for security.

A)SLIP
B)NCP
C)CSLIP
D)PPP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
Describe an advantage of FTP over TFTP and NFS.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
How are Ethernet and token ring access methods facilitated in AppleTalk Phase II networks?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
What are five prominent features of IPv6 (IP version 6)?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
Match between columns
protocol developed by Novell for the NetWare operating system.
Internetwork Package Exchange (IPX)
protocol developed by Novell for the NetWare operating system.
AppleTalk
protocol developed by Novell for the NetWare operating system.
TCP port
protocol developed by Novell for the NetWare operating system.
checksum
protocol developed by Novell for the NetWare operating system.
dotted decimal notation address
protocol developed by Novell for the NetWare operating system.
anycast packet
protocol developed by Novell for the NetWare operating system.
terminal emulation
protocol developed by Novell for the NetWare operating system.
Simple Mail Transfer Protocol (SMTP)
protocol developed by Novell for the NetWare operating system.
namespace
logical area on a network that contains a list of named objects and performs name resolution.
Internetwork Package Exchange (IPX)
logical area on a network that contains a list of named objects and performs name resolution.
AppleTalk
logical area on a network that contains a list of named objects and performs name resolution.
TCP port
logical area on a network that contains a list of named objects and performs name resolution.
checksum
logical area on a network that contains a list of named objects and performs name resolution.
dotted decimal notation address
logical area on a network that contains a list of named objects and performs name resolution.
anycast packet
logical area on a network that contains a list of named objects and performs name resolution.
terminal emulation
logical area on a network that contains a list of named objects and performs name resolution.
Simple Mail Transfer Protocol (SMTP)
logical area on a network that contains a list of named objects and performs name resolution.
namespace
contains a destination address that is associated with multiple interfaces, usually on different nodes.
Internetwork Package Exchange (IPX)
contains a destination address that is associated with multiple interfaces, usually on different nodes.
AppleTalk
contains a destination address that is associated with multiple interfaces, usually on different nodes.
TCP port
contains a destination address that is associated with multiple interfaces, usually on different nodes.
checksum
contains a destination address that is associated with multiple interfaces, usually on different nodes.
dotted decimal notation address
contains a destination address that is associated with multiple interfaces, usually on different nodes.
anycast packet
contains a destination address that is associated with multiple interfaces, usually on different nodes.
terminal emulation
contains a destination address that is associated with multiple interfaces, usually on different nodes.
Simple Mail Transfer Protocol (SMTP)
contains a destination address that is associated with multiple interfaces, usually on different nodes.
namespace
involves using software to make a computer, such as a PC, behave as though it were a terminal.
Internetwork Package Exchange (IPX)
involves using software to make a computer, such as a PC, behave as though it were a terminal.
AppleTalk
involves using software to make a computer, such as a PC, behave as though it were a terminal.
TCP port
involves using software to make a computer, such as a PC, behave as though it were a terminal.
checksum
involves using software to make a computer, such as a PC, behave as though it were a terminal.
dotted decimal notation address
involves using software to make a computer, such as a PC, behave as though it were a terminal.
anycast packet
involves using software to make a computer, such as a PC, behave as though it were a terminal.
terminal emulation
involves using software to make a computer, such as a PC, behave as though it were a terminal.
Simple Mail Transfer Protocol (SMTP)
involves using software to make a computer, such as a PC, behave as though it were a terminal.
namespace
provides an alternative to FTP for sending a file from one computer system to another.
Internetwork Package Exchange (IPX)
provides an alternative to FTP for sending a file from one computer system to another.
AppleTalk
provides an alternative to FTP for sending a file from one computer system to another.
TCP port
provides an alternative to FTP for sending a file from one computer system to another.
checksum
provides an alternative to FTP for sending a file from one computer system to another.
dotted decimal notation address
provides an alternative to FTP for sending a file from one computer system to another.
anycast packet
provides an alternative to FTP for sending a file from one computer system to another.
terminal emulation
provides an alternative to FTP for sending a file from one computer system to another.
Simple Mail Transfer Protocol (SMTP)
provides an alternative to FTP for sending a file from one computer system to another.
namespace
16-bit cyclic redundancy check based on length of all TCP header fields and the data payload field
Internetwork Package Exchange (IPX)
16-bit cyclic redundancy check based on length of all TCP header fields and the data payload field
AppleTalk
16-bit cyclic redundancy check based on length of all TCP header fields and the data payload field
TCP port
16-bit cyclic redundancy check based on length of all TCP header fields and the data payload field
checksum
16-bit cyclic redundancy check based on length of all TCP header fields and the data payload field
dotted decimal notation address
16-bit cyclic redundancy check based on length of all TCP header fields and the data payload field
anycast packet
16-bit cyclic redundancy check based on length of all TCP header fields and the data payload field
terminal emulation
16-bit cyclic redundancy check based on length of all TCP header fields and the data payload field
Simple Mail Transfer Protocol (SMTP)
16-bit cyclic redundancy check based on length of all TCP header fields and the data payload field
namespace
IP address format
Internetwork Package Exchange (IPX)
IP address format
AppleTalk
IP address format
TCP port
IP address format
checksum
IP address format
dotted decimal notation address
IP address format
anycast packet
IP address format
terminal emulation
IP address format
Simple Mail Transfer Protocol (SMTP)
IP address format
namespace
peer-to-peer network protocol especially designed for Macintosh computers.
Internetwork Package Exchange (IPX)
peer-to-peer network protocol especially designed for Macintosh computers.
AppleTalk
peer-to-peer network protocol especially designed for Macintosh computers.
TCP port
peer-to-peer network protocol especially designed for Macintosh computers.
checksum
peer-to-peer network protocol especially designed for Macintosh computers.
dotted decimal notation address
peer-to-peer network protocol especially designed for Macintosh computers.
anycast packet
peer-to-peer network protocol especially designed for Macintosh computers.
terminal emulation
peer-to-peer network protocol especially designed for Macintosh computers.
Simple Mail Transfer Protocol (SMTP)
peer-to-peer network protocol especially designed for Macintosh computers.
namespace
similar to a virtual circuit between two communicating processes on two different nodes.
Internetwork Package Exchange (IPX)
similar to a virtual circuit between two communicating processes on two different nodes.
AppleTalk
similar to a virtual circuit between two communicating processes on two different nodes.
TCP port
similar to a virtual circuit between two communicating processes on two different nodes.
checksum
similar to a virtual circuit between two communicating processes on two different nodes.
dotted decimal notation address
similar to a virtual circuit between two communicating processes on two different nodes.
anycast packet
similar to a virtual circuit between two communicating processes on two different nodes.
terminal emulation
similar to a virtual circuit between two communicating processes on two different nodes.
Simple Mail Transfer Protocol (SMTP)
similar to a virtual circuit between two communicating processes on two different nodes.
namespace
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
How is the Dynamic Host Configuration Protocol (DHCP)used?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.