ProvideSupport is an online service that allows you to chat with your website visitors, enabling you to give instant online customer support and proactively sell your product. This web-hosted system means you don't have to worry about server capacity, bandwidth usage, system upgrades and other issues. An optional browser-based operator console allows you to monitor your website for chat requests 24/7 from any location, from any system connected to the Internet. The system supports 256-bit SSL encryption and features visitor monitoring with geographic location identification, IP address, referrer, visited pages, and more. You can proactively invite your visitors to chat, request visitors' feedback when chat is finished, push pages, transfer calls to other operators, use canned answers, save chat sessions logs, assign operators to multiple departments, set up sound and/or visual alerts on different events, see "party is typing" notification. Very easy to set up - just paste a small HTML snippet into your web page source code. Web-based, Windows, Linux and Mac OS operator client. No plug-ins or software installation required on customer's side. Fully customizable chat window to fit your website design. Large gallery of chat button images and chat invitations. Fully functional 10-day free trial.
The characteristics of RIPv2 follow: - Distance-vector protocol. - Use UDP port 520. - Makes Automatic summarization on network Class boundary. - Classless protocol (supports VLSMs). - Have the power to shut the Auto-summarization And make a configured manual Summarization. - Supports VLSMs. - Metric is router hop count. - Maximum hop count is 15; infinite (unreachable) routes have a metric of 16. - Periodic route updates sent every 30 seconds to multicast address 224.0.0.9. - 25 routes per RIP message (24 if authentication is used). - Invalid route marked after 180 sec. - Flush timer is 280 sec. - Hold-down timer 180 sec. - Supports authentication. - Implements split horizon with poison reverse. - Implements triggered updates. - Subnet mask included in route entry. - Administrative distance for RIPv2 is 120. - Used in small, flat networks or at the edge of larger networks. RIPv2 Convergence The steps for RIPv2 convergence are as follows: 1- When the local router sees a connected route disappear, it sends a Flash update and removes the route entry from its table. This is Called a triggered update with poison reverse.
2- The receiving routers send a Flash update and put the affected route in holddown.
3- The originating router queries its neighbor (DC) for alternative routes. If the neighbor has an alternative route, it is sent; otherwise, the Poisoned route is sent. 4- The originating router installs the best alternative route that it hears because it has purged the original routes, and Send the new updates in its periodic routing update timer (30 sec).
5- Routers that are in holddown ignore only the alternative route.
6- When the other routers emerge from holddown, they will accept the alternative route.
7- Convergence takes the time for detection, plus holddown, plus the number of routing updates (equal to the hop-count diameter of the network). This could take a long time.
RIP v2 Configuration
config)# router rip conf-router)# version 2 conf-router)# no auto-summary conf-router)# network < classfull Net ID>
conf-router)#passive-interface
conf-router)#maximum –paths (Up to 6 Links for load sharing on a R.B basis, Over equal metric paths default =is 4 paths)
conf-if)# no ip split-horizon (Disables it from a specific interface) c onf-router)#distance (Define an administrative distance, default =120)
conf-router)# timers basic < update - invalid –holdown –flush – sleep > (Adjust timers in sec , Sleeptime is a timer used to specify a period, in milliseconds, to delay a regular routing update after receiving a triggered update.)
conf-router)# neighbor < ip add> (Because RIP is a broadcast protocol you may configure RIP to exchange routing information in a Point-Point non-broadcast network such as Frame Relay. In this type of network, RIP must be informed of neighbor RIP routers, Also When it is used in combination with the passive-interface cmd, routing information can be Only exchanged between the router and this nei Ex. Unix server on a LAN )
conf-router)#validate-update-source (This command is applicable only to RIP and IGRP. The software ensures that the source IP address of incoming routing updates is on the same IP network as one of the addresses defined for the receiving interface. Disabling split horizon on the incoming interface will also cause the system to perform this validation check. For unnumbered IP interfaces (interfaces configured as IP unnumbered), no checking is performed. )
conf-router)# no auto-summary conf-if )# ip summary-address rip < Net ID + mask>
Show Commands
# sh ip route # sh ip route rip # sh ip route < Net ID > # sh ip rip database # sh ip protocols
-Hybrid routing protocol (distance vector that has link-state protocol characteristics).
-Use DUAL, first proposed by E. W. Dijkstra and C. S. Scholten,to perform distributed shortest-path routing while maintaining freedom from loops at every instant. Although many researchers have contributed to the development of DUAL, the most prominent work is that of J. J. Garcia-Luna-Aceves.
-Cisco Proprietary created in 1994.
-First released in IOS 9.21
-Uses IP protocol 88.
-Makes Automatic summarization on network Class boundary.
-Classless protocol (supports VLSM).
-Have the power to shut the Auto-summarization And make a configured manual Summarization.
-Default composite metric of bandwidth and delay.
-You can factor load, MTU and reliability into the metric.
-Eigrp metric is the same as IGRP*256, It uses the smallest B.W,Reliablity,Load & MTU with the Comulative delay upon the path…..The MTU doesn’t actually used in the Metric calculations, But is included in the EIGRP Routing updates.
-Sends route updates to multicast address 224.0.0.10, and nei. Reply’s back withUnicast Address.
-Sends non-periodic, partial, and bounded updates.
-Send Hello packets every 5 sec. and Hold down timer is 15 sec.
-For Low speed Hello is every 60 sec. with hold down time 180 sec.
-By default, EIGRP uses no more than 50 percent of the bandwidth of a link.
-Support for authentication via MD5 Only.
-Uses DUAL for loop prevention, and generating Succ./Fesible Succ.
-Maximum paths for Load-balancing are 6& default is 4 , maximum are 16 in IOS 12.3(2)T and later IOS releases
-By default, Equal-Metric load balancing. If Unequal-Metric load sharing is used the router will load share inversely proportional to the metrics of the paths.
-Administrative distance is 90 for EIGRP internal routes, 170 for EIGRP external routes, and 5 for EIGRP summary routes.
-Potential routing protocol for the core of a network; used in large networks.
-For neighbor relation to be established, both routers must send and receive Hello or Ack packets from each other, they must have the same AS #, and the same Metric K values.
-Eigrp doesn’t restrict that neighbors must have the same Hello & dead interval timers, Unlike OSPF.
-Has a Maximum hop count of 255, the default is 100 in the last IOS releases.
The composite metric for each EIGRP route is calculated as
If k5 is set to zero, the [k5/(RELIABILITY+k4)] term is not used.
Given the default values for k1 through k5, the composite metric calculation used by IGRP reduces to the default metric:
IGRP metric = BWIGRP(min) + DLYIGRP(sum)
BWIGRP(min) = 107/BW(min)
DLYIGRP(sum) = DLY(sum) /10
EGRP uses multiple packet types, all identified by protocol number 88 in the IP header:
·Hellos are used by the neighbor discovery and recovery process. Hello packets are multicast and use unreliable delivery.
·Acknowledgments (ACKs) are Hello packets with no data in them. ACKs are always unicast and use unreliable delivery.
·Updatesconvey route information. Unlike RIP and IGRP updates, these packets are transmitted only when necessary, contain only necessary information, and are sent only to routers that require the information. When updates are required by a specific router, they are unicast. When updates are required by multiple routers, such as upon a metric or topology change, they are multicast. Updates always use reliable delivery.
·Queries and Replies are used by the DUAL finite state machine to manage its diffusing computations. Queries can be multicast or unicast, and replies are always unicast. Both queries and replies use reliable delivery.
·Requests were a type of packet originally intended for use in route servers. This application was never implemented, and request packets are noted here only because they are mentioned in some older EIGRP documentation.
EIGRP has four components:
Protocol-Dependent Modules (PDM): EIGRP implements modules for IP, IPX, and AppleTalk, which are responsible for the protocol-specific routing tasks. For example, the IPX EIGRP module is responsible for exchanging route information about IPX networks with other IPX EIGRP processes and for passing the information to the DUAL. Additionally, the IPX module will send and receive SAP information.
Reliable Transport Protocol (RTP): The Reliable Transport Protocol (RTP) manages the delivery and reception of EIGRP packets. Reliable delivery means that delivery is guaranteed and that packets will be delivered in order. If any packet is reliably multicast and an ACK is not received from a neighbor, the packet will be retransmitted as a unicast to that unresponding neighbor. If an ACK is not received after 16 of these unicast retransmissions, the neighbor will be declared dead. The time to wait for an ACK before switching from multicast to unicast is specified by the multicast flow timer. The time between the subsequent unicasts is specified by the retransmission timeout (RTO). Both the multicast flow timer and the RTO are calculated for each neighbor from the smooth round-trip time (SRTT). The SRTT is the average elapsed time, measured in milliseconds, between the transmission of a packet to the neighbor and the receipt of an acknowledgment. The formulas for calculating the exact values of the SRTT, the RTO, and the multicast flow timer are proprietary.
Neighbor Discovery/Recovery: Hellos are multicast every 5 sec., minus a small random time to prevent synchronization. & are unicast every 60 sec. On multipointX.25, Frame Relay, and ATM interfaces, with access link speeds of T1 or slower also it's the default for ATM SVCs and for ISDN PRI In all cases, the Hellos are unacknowledged.
Diffusing Update Algorithm (DUAL): Used For routing calculations, loop free & convergence.
EIGRP Configuration
config)# routereigrp
conf-router)# network< Net ID>(classlfull)
conf-router)# metric maximum-hop <#>(Up to 255, default =224)
conf-router)#passive-interface <interface>
conf-router)#distanceeigrp
(Define an administrative distance, default =90 & 170)
conf-router)#maximum –paths <N>(Up to 6 Links for load sharing,
Over Unequal metric paths default is 4 paths)
conf-router)#variance <#>
conf-router)#traffic-share< minimum / balanced >
conf-router)# eigrp log-neighbor-changes
conf-router)#no auto-summary(disable automatic summ. To the class boundary)
config-if)# ip summary-address eigrp
config-if)#bandwidth< # in Kbps>
config-if)#delay < msec>
config-if)#ip hello-intervaleigrp < sec >
config-if)#ip hold-time eigrp < sec >
EIGRP Authentication MD5
The router may be configured to use more than one "key chain."& also different keys at different times (key management).
Auth must be done in a fixed order rather than this you may have problems, The steps for setting up EIGRP authentication follow:
1-Define a key chain with a name.
2- Define the authentication key or keys on the key chain
3- Define the password of the key or keys.
4- Apply MD5 authentication on an interface (EIGRP only support MD5).
5- Apply authentication on an interface and specify the key chain to be used.
If the service password-encryption command is not used when implementing EIGRPauthentication, the key string will be stored as plain text in the router configuration. If youconfigure the service password-encryption command, the key string will be stored anddisplayed in an encrypted form; when it is displayed, there will be an encryption type of 7specified before the encrypted key string.
The password that is accepted from other routers and the password that is used with transmitted/sent messages are managed separately. Both the accept-lifetime and the send-lifetime cmd. must have a specified start time and may have either a specified duration or end time or the keyword infinite. The key numbers are examined from the lowest to the highest, and the first valid key is used.
accept life time = accept this key
send life time = send/replywith a key for auth , based on its send lifetime.
For RIP key ID & its password isn't important to match, they will work.
BUT for EIGRP key # must match.
Show Commands
# sh ip route
# sh ip route eigrp
# sh ip route < Net ID >
# sh ip protocols
# sh ip eigrp traffic
# sh ip eigrp traffic
# sh ip eigrp nei
# sh ip eigrp topology
# sh ip eigrp topology(optional)
# sh ip eigrp topology all-links
# sh ip eigrp topology < active / pending / zero-successors>
# sh ip eigrp traffic
# sh ip eigrp events(Shows the types of packets sent and received and
statistics on routing decisions.)
#debug ip eigrp
#debug ip eigrp fsm
#debug ip eigrp nei(Shows the hello packets sent and received to the neighbors)
#debug ip eigrp route(Shows dynamic changes made on the routing table process)
#debug ip eigrp summary (Shows a summary of the EIGRP activity)
#debug ip eigrp packet(Shows the packets sent and received by the router.
2.Refer to the exhibit. How many collision domains are present in the topology?
¡3
¡5
¡6
¡7
¡8
¡9
3.Refer to the exhibit. An instructor in the network class has given the students the network diagram and asks the students to select the appropriate network devices. The goals are to provide a collision-free LAN environment and to provide Internet connectivity. What is the correct design?
¡Replace Box 1 with a hub and Box 2 with a router.
¡Replace Box 1 with a router and Box 2 with a bridge.
¡Replace Box 1 with a Layer 2 switch and Box 2 with a router.
¡Replace Box 1 with a router and Box 2 with a Layer 2 switch.
¡Replace Box 1 with a bridge and Box 2 with a Layer 2 switch.
4. Refer to the exhibit. A network administrator attempts to increase the available bandwidth for workstation A by setting the NIC to full-duplex mode. After the configuration is changed, there are increased collisions and errors occurring. Why is this occurring in the network?
¡The NIC is no longer detecting collisions.
¡The switch will not support full-duplex mode.
¡The hub will be continually producing a jam signal.
¡The cabling will not support bidirectional transmissions.
5.Refer to the exhibit. A network administrator is testing a connectivity issue in the network. The administrator discovers that host A cannot communicate with host B, host C, or RouterA. A ping command on host A to 127.0.0.1 succeeds. The NIC link indicator on host A is illuminated. Temporarily, the administrator removes the cable from host A and uses the LAN cable from host B to connect from host A to port 1 on the switch. While using the substitute cable, host A can communicate with host C and RouterA. At which layer of the OSI model was the problem occurring?
¡session
¡transport
¡network
¡data link
¡physical
6.How many broadcast domains are shown in the diagram?
¡three
¡four
¡five
¡six
¡seven
¡eight
7.A collision has occurred on an Ethernet network. Which three statements explain the CSMA/CD process? (Choose three.)
¨After the jam signal, all transmission stops for a random period.
¨When the collision is detected, the hosts stop transmission immediately.
¨When the collision is detected, the hosts stop transmission after eight microseconds
¨When the backoff period expires, the hosts involved in the collision have priority to transmit
¨When the backoff period expires, each host checks to see whether the networking media is idle and then attempts to transmit.
¨When the collision is detected, the hosts continue to transmit using a jam pattern for a short time to ensure that all hosts detect the collision.
8.Which of the following devices extend a collision domain? (Choose two.)
¨switch
¨hub
¨bridge
¨router
¨repeater
9.What should a network administrator consider when migrating to Gigabit Ethernet architecture from Fast Ethernet? (Choose three.)
¨Existing NICs might need to be upgraded.
¨Existing switches might need to be upgraded.
¨Existing NICs must support half-duplex mode.
¨Existing UTP wiring must be replaced with fiber.
¨Existing UTP must be tested for CAT 5e compatibility.
¨Existing network topology must support shared media.
10.Refer to the exhibit. What must be configured on Host B to allow it to communicate with the Host C? (Choose three.)
¨the MAC address of RTA router interface connected to Switch 1
¨a unique host IP address
¨the IP address of Switch 1
¨the default gateway address
¨the MAC address of Host C
¨the subnet mask for the LAN LAN
11.Which binary number is a representation of the decimal number 248?
¡11101000
¡11110100
¡11111000
¡11111010
12.Which type of address is 223.168.17.167/29? 223.168.17.167/29?
¡host address
¡multicast address
¡broadcast address
¡subnetwork address
13.Workstation A sends data to workstation B. What will have to be altered as the data passes through the router? (Choose two.)
¨Layer 1 bit pattern
¨Layer 2 frames
¨Layer 3 packets
¨Layer 4 segments
¨Layer 5 -7 data
14.Which combination of network id and subnet mask correctly identifies all IP addresses from 172.16.128.0 through 172.16.159.255?
¡172.16.128.0 255.255.255.224
¡172.16.128.0 255.255.0.0
¡172.16.128.0 255.255.192.0
¡172.16.128.0 255.255.224.0
¡172.16.128.0 255.255.255.192
15.What is the correct number of usable subnetworks and hosts for the IP network address 192.168.99.0 subnetted with a /29 mask?
¡6 networks / 32 hosts
¡14 networks / 14 hosts
¡30 networks / 6 hosts
¡62 networks / 2 hosts
16.Refer to the exhibit. The internetwork in the exhibit has been assigned the IP address 172.20.0.0. What would be the appropriate subnet mask to maximize the number of networks available for future growth?
¡255.255.224.0
¡255.255.240.0
¡255.255.248.0
¡255.255.252.0
¡255.255.254.0
¡255.255.255.0
17.A NIC of a computer has been assigned an IP address of 172.31.192.166 with a mask of 255.255.255.248. To which subnet does the IP address belong?
¡172.31.0.0
¡172.31.160.0
¡172.31.192.0
¡172.31.248.0
¡172.31.192.160
¡172.31.192.248
18.What are three characteristics of the TCP protocol? (Choose three.)
¨exchanges datagrams unreliably
¨is used to send IP error messages
¨forces the retransmission of unacknowledged packets
¨creates a virtual session between end-user applications
¨carries the IP address of the destination host in the TCP header
¨is responsible for breaking messages into segments and reassembling them at their destination
19.A network user is using the FTP protocol to transfer data from the local host to an FTP server. The local host is also using the SNMP protocol to report the system status to the network management system. Which statement describes the communication from the host?
¡FTP and SNMP will use the same port number.
¡FTP uses TCP to establish a session before any data is transferred.
¡The UDP session will reorder the SNMP data as it is received by the network management system.
¡The TCP protocol for the FTP transfer will use a random destination port number to the FTP server.
20.Which protocols are TCP/IP application layer protocols? (Choose two.)
¨UDP
¨FTP
¨IP
¨SMTP
¨TCP
21.Which technologies are considered to be WAN technologies? (Choose two.)
¨Ethernet
¨DSL
¨Token Ring
¨Frame Relay
¨FDDI
22.Refer to the exhibit. What is the order of the TCP/IP Protocol Data Units as data is moved as indicated through the OSI model?
¡data, segments, frames, packets, bits
¡data, packets, segments, frames, bits
¡data, segments, packets, frames, bits
¡data, packets, frames, segments, bits
23.Refer to the exhibit. A newly hired technician has a task of terminating CAT 5 UTP cables. The network administrator visually examined the cables the technician terminated. Some of the cables have connectors as shown in the exhibit. What should the network administrator explain to the technician about the cables?
¡Both cables are acceptable.
¡The cable in Graphic A will produce more crosstalk.
¡The cable in Graphic A should be used in the more critical network segments.
¡The cable in Graphic A is preferred because it will be easier to crimp the connector.
24.Refer to the exhibit. Which type of UTP cable should be used to connect Switch1 to Switch2?
¡rollover
¡console
¡crossover
¡straight-through
25.When using Category 5 UTP cable, which RJ-45 pin pairs are used to exchange data between hosts on an Ethernet network?
¡1 and 2; 4 and 5
¡1 and 2; 3 and 6
¡3 and 6; 7 and 8
¡4 and 5; 7 and 8
26.Refer to the exhibit. Which type of cabling should be used at each of the connection points shown?
27.Refer to the exhibit. What type of cable connects the two routers together without any intermediary device?
¡console
¡rollover
¡crossover
¡straight-through
28.Which cable diagram displays the end to end pinout for a console cable used with Cisco devices?
¡Cable A
¡Cable B
¡Cable C
¡Cable D
29.Which subnet masks would be valid for a subnetted Class B address? (Choose two.)
¡255.0.0.0
¡255.254.0.0
¡255.224.0.0
¡255.255.0.0
¡255.255.252.0
¡255.255.255.192
30.What type of routing is it when the network administrator manually configures a route?
¡static
¡dynamic
¡interior
¡exterior
31.Which statement describes a star topology?
¡Each host in the network is connected to a backbone cable that is terminated at both ends.
¡Each host is connected to a hub or switch, either of which acts as a central point for all network connections.
¡Each host is directly connected to two other hosts to form a long chain of hosts.
¡Each host has a connection to all other hosts in the network.
32.Refer to the exhibit. The connections in the exhibit are labeled A through E. Which of these indicate WAN links? (Choose three.)
¨link A
¨link B
¨link C
¨link D
¨link E
33.A technician needs to connect a FastEthernet port from a router to a FastEthernet port on a switch. The graphic shows the RJ-45 cable ends for a patch cable. What result can be expected if this cable is used for the link?
¡The cable will be able to pass traffic between the devices.
¡The cable has reversed-pairs, which will degrade the signal quality.
¡The cable has split-pairs, which will increase crosstalk and create an unreliable link.
¡The cable has all the wires reversed, which will prevent the link lights from indicating that there is link.
34.Refer to the received frame in the exhibit. In what two ways is the information from the received frame used by a switch? (Choose two.)
¨192.168.10.5 is used to create an ARP request.
¨192.168.10.5 is used to build the forwarding table.
¨1234.5678.1abc is stripped from the frame header.
¨192.168.10.11 is left intact as the frame is forwarded.
¨The switch compares 192.168.10.11 to the addresses in the routing table to make the forwarding decision.
¨To make the forwarding decision, the switch looks in its switch table for address aaaa.bbbb.cccc.
35.Which layer of the OSI model defines the process of adding the source and destination IP address to a data packet?
¡transport
¡network
¡data link
¡physical
36.Refer to the exhibit. Workstation 1 pings the Fa0/1 interface of Router 1. Which MAC address will workstation 1 obtain during the ARP request for this communication?
¡00-06-5B-88-DF-C3
¡B0-D0-7F-F7-46
¡00-0F-24-85-75-C0
¡00-0B-E5-64-BD-44
¡00-08-A3-B6-CE-02
¡00-08-A3-B6-CE-03
37.Refer to the exhibit. What device does Device X represent in the graphic to allow PC1 to ping PC4?
¡hub
¡router
¡bridge
¡access point
¡Layer 2 switch
38.When the receiving workstation detects an error in the data it has received, it does not acknowledge receipt of the data. The source workstation retransmits the unacknowledged data. Which layer of the OSI model supports this process of retransmission?
¡network
¡application
¡session
¡transport
39.A company has the following addressing scheme requirements: -currently has 25 subnets-uses a Class B IP address-has a maximum of 300 computers on any network segment-needs to leave the fewest unused addresses in each subnetWhat subnet mask is appropriate to use in this company?
¡255.255.240.0
¡255.255.248.0
¡255.255.254.0
¡255.255.255.0
¡255.255.255.128
¡255.255.255.248
40.What can be verified by successfully pinging the reserved loopback address on a host?
¡Connectivity exists between two hosts on the LAN. LAN
¡The TCP/IP stack of the local host is installed correctly.
¡A connection exists between a host and the default gateway.
¡The route a packet takes from the local host to a remote host is valid.
41.Refer to the exhibit. A company needs to attach workstation E at a point 150 meters from an existing hub. What device should be placed at location D to allow the new host to connect to the network with the least amount of latency?
¡router
¡switch
¡bridge
¡repeater
42.Refer to the exhibit. Which type of Category 5 cable is used to make an Ethernet connection between Host A and Host B?
¡coax cable
¡rollover cable
¡crossover cable
¡straight-through cable
43.A simplified CAM table for Switch1 is shown in the exhibit. If host A sends a frame with a destination MAC address of 66C, how does the switch process this frame?
¡The switch drops the frame.
¡The switch sends the frame out port 3.
¡The switch sends the frame out ports 1, 2, and 4.
¡The switch sends the frame out ports 2, 3, and 4.
¡The switch sends the frame out ports 1, 2, 3, and 4.
44.Which of the following increases the potential for a collision to occur?
¡the use of an active hub instead of an intelligent hub
¡the use of an intelligent hub instead of an active hub
¡a reduction in the number of devices attached to the hub
¡an increase in the number of devices attached to the hub
45.Refer to the exhibit. Host A has been added to the network. However, host A cannot communicate with the server B or the Internet. All cables have been tested and are functioning to standards. At which layer of the OSI model is this problem occurring?
¡Layer 1
¡Layer 2
¡Layer 3
¡Layer 4
46.A workstation is browsing a web server. What will be the partial contents of the segment sent from the workstation to the web server?
47.Refer to the exhibit. What is the purpose of the highlighted address?
¡It allows the NIC to communicate with other devices on the same network.
¡It identifies which part of the IP address is to be considered the network portion.
¡It provides an address to which all packets that do not have a specific route are sent.
¡It uniquely identifies the NIC to the free token that is passed on the Ethernet network.
48.Refer to the exhibit. Host A is being manually configured for connectivity to the LAN. Which two addressing scheme combinations are possible configurations that can be applied to the host for connectivity? (Choose two.)
oAddress - 192.168.1.14 Gateway - 192.168.1.33
oAddress - 192.168.1.45 Gateway - 192.168.1.33
oAddress - 192.168.1.32 Gateway - 192.168.1.33
oAddress - 192.168.1.82 Gateway - 192.168.1.65
oAddress - 192.168.1.63 Gateway - 192.168.1.65
oAddress - 192.168.1.70 Gateway - 192.168.1.65
49.A user initiates three simultaneous FTP connections from the local host to the same FTP server. Which OSI layer is responsible for establishing and managing these different FTP connections?