1.
|
Explain how open system protocols differ from proprietary protocols.
(I)
|
2.
|
Describe the OSI model of a network architecture and the interaction
between layers in the OSI model. (I)
|
3.
|
Describe the current open system architecture and the interaction
between the layers within that architecture.(I)
|
4.
|
Compare and contrast the current open system architecture with the OSI
model. (I)
|
5.
|
Use internet protocols for file transfer, remote access, and
electronic mail. (II)
|
6.
|
Describe features of application protocols which permit them to be
used on any computer, regardless of the computers underlying
architecture. (II)
|
7.
|
Compare and contrast connectionless transport providers with
connection-oriented transport providers. (III)
|
8.
|
Describe each of the following in the context of a connection-
orientedtransport provider: Acknowledgement and retransmission.
Windowing and flow control. End to end error detection. Connection
establishment and connection termination. Round trip time estimation.
Backoff and congestion. (III)
|
9.
|
Compare and contrast different approaches to addressing and
subnetting. (IV)
|
10.
|
Compare and contrast different routing protocols. (IV)
|
11.
|
Describe how internet addresses are mapped to physical addresses. (V)
|
12.
|
Explain how internet protocols are hardware independent. (I,V)
|
|