Chap567HW

.docx

School

University of Texas, Arlington *

*We aren’t endorsed by this school

Course

3303

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

26

Uploaded by MegaTreeAnteater20

Report
Chapter 5 1. What does the transport layer do? The transport layer links application software in the application layer with the network and is responsible for the end-to-end delivery of the message. The transport layer sits between the application layer and the network layer. The transport layer accepts messages from the application layer and packetizes them. Packetizing means to take one outgoing message from the application layer and break it into a set of smaller packets for transmission through the network. Conversely, it also means to take the incoming set of smaller packets form the network layer and reassemble them into one message for the application layer. 2. What does the network layer do? The network layer performs three important functions: addressing, routing, and breaking long messages into smaller packets for transmission by the data link layer. The network layer sits between the application layer and the data link layer. The network layer accepts messages from the application layer and formats and addresses them for transmission by the data link layer. The network layer also accepts individual messages from the data link layer and organizes them into coherent messages that it passes to the application layer. 3. Compare and contrast the three types of addresses used in a network. When users work with application software, they typically use the application layer address (e.g., entering an Internet address into a browser, such as www.cba.uga.edu). When a user types of an Internet address into a Web browser, the request is passed to the network layer as part of an application layer packet formatted using the HTTP standard.
The network layer software translates this application layer address into a network layer address. The network layer protocol used on the Internet is TCP/IP, so this Web address (www.cba.uga.edu) is translated into an TCP/IP address (usually just called an IP address for short) which is four bytes long when using IPv4 (e.g., 128.192.78.5). The network layer then determines the best route through the network to the final destination. Based on this routing, the network layer identifies the data link layer address of the next computer to which the message should be sent. If the data link layer is running Ethernet, then the network layer IP address would be translated into an Ethernet address (e.g., 00-0F-00-81-14-00). 4. How does TCP establish a session? TCP sets up a virtual circuit between the sender and the receiver. The transport layer software sends a special packet (called a SYN, or synchronization characters) to the receiver requesting that a connection be established. The receiver either accepts or rejects the connection, and together, they settle on the packet sizes the connection will use. Once the connection is established, the packets flow between the sender and the receiver, following the same route through the network. 5. What is a subnet and why do networks need them? Each organization must assign the IP addresses it has received to specific computers on its networks. In general, IP addresses are assigned so that all computers on the same local area network have a similar address. For example, suppose a university has just received a set of Class B addresses starting with 128.184.x.x. It is customary to assign all the computers in the same LAN numbers that start with the same first three digits, so the Business School LAN might be assigned 128.184.56.x while the Computer Science LAN
might be assigned 128.184.55.x (see Figure 6-8). Likewise, all the other LANs at the university and the backbone network that connects them would have a different set of numbers. Each of these LANs are called a TCP/IP subnet because they are logically grouped together by IP number. Knowing whether a computer is on your subnet or not it very important for message routing. 6. How does TCP/IP perform address resolution from URLs into network layer addresses? It Uses one or more Domain Name Service servers to resolve the address. 7. How does TCP/IP perform address resolution from IP addresses into data link layer addresses? It uses ARP to identify the MAC address of the next node(that packet must be forward) 8. How does static routing differ from dynamic routing? When would you use static routing? When would you use dynamic routing? With static routing, the routing table is developed by the network manager, and changes only when computers are added to or removed from the network. For example, if the computer recognizes that a circuit is broken or unusable (e.g., after the data link layer retry limit has been exceeded without receiving an acknowledgment), the computer will update the routing table to indicate the failed circuit. If an alternate route is available, it will be used for all subsequent messages. Otherwise, messages will be stored until the circuit is repaired. When new computers are added to the network, they announce their presence to the other computers, who automatically add them into their routing tables. Static routing is commonly used in networks that have few routing options. For example,
most LANs are connected to the backbone network in only one place. There is only one route from the LAN to the backbone, so static routing is used. Dynamic routing (or adaptive routing) is used when there are multiple routes through a network and it is important to select the best route. Dynamic routing attempts to improve network performance by routing messages over the fastest possible route, away from busy circuits and busy computers. An initial routing table is developed by the network manager, but is continuously updated by the computers themselves to reflect changing network conditions, such as network traffic. Routers can monitor outgoing messages to see how long they take to transmit and how long it takes for the receiving computer to acknowledge them. Based on this monitoring the router can effectuate table updating. 9. Suppose that a client computer (128.192.98.130) in Building B in Figure 5-17 requests a large Web page from the Web server 2 in the Data Center (www2.anyorg.com). Assume that the client computer has just been turned on and does not know any addresses other than those in its configuration tables. Assume that all gateways and Web servers know all network layer and data link layer addresses. Explain what messages would be sent and how they would flow through the network to deliver the Web page request to the server. When a client computer (128.192.98.130) in Building A requests a large web page from Web server 2 (www2.anyorg.com) in the Data Center, the process involves several steps. This process illustrates how network messages flow through the network to deliver a web page request to the server, with various devices and protocols involved in routing and communication.
10. Hands-on activity 5D in the book. Deliverable: Binary representation of a byte Decimal 10000000 128 11000000 192 11100000 224 11110000 240 11111000 248 11111100 252 11111110 254 11111111 255 Deliverables: 1. Number of subnets required Number of borrowed bits Maximum number of hosts per subnet Subnet mask in binary and decimal 2 1 128 11111111.11111111.11111111.10000000 => 255.255.255.128 5 3 32 11111111.11111111.11111111.11100000 =>255.255.255.224 12 4 16 11111111.11111111.11111111.11110000 =>255.255.255.240 24 5 8 11111111.11111111.11111111.11111000 =>255.255.255.248 40 6 4 11111111.11111111.11111111.11111100 =>255.255.255.252 2.
Number of subnets required Borrowed bits Max number of hosts Subnet mask 5 3 8192 11111111.11111111.11100000.00000000 => 255.255.224.0 8 3 8192 11111111.11111111.11100000.00000000 => 255.255.224.0 35 5 2048 11111111.11111111.11111000.00000000 => 255.255.248.0 200 8 256 11111111.11111111.11111111.00000000 => 255.255.255.0 400 9 128 11111111.11111111.11111111.10000000 => 255.255.255.128 3. Subnets required Borrowed bits Max number of hosts Subnet mask 10 4 1048576 11111111.11110000.00000000.00000000 => 255.240.0.0 20 5 524288 11111111.11111000.00000000.00000000 => 255.248.0.0 80 7 131072 11111111.11111110.00000000.00000000 => 255.254.0.0 400 9 32768 11111111.11111111.10000000.00000000 => 255.255.128.0 2000 11 8192 11111111.11111111.11100000.00000000 => 255.255.224.0 TCPIP Utilities: please refer to INSY 5343 TCPIP Utilities Lab.docx Actions
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help