Name: 5 points
R1, R2, R9, R10, R11 (10 points each)
P1, P2, P14 (15 points each)
R1) Consider the transportation analogy in Section 6.1.1 .If the passenger is analogous to a datagram, what is analogous to the link layer frame? Answer: The transportation mode, such as the train, is analogous to the link layer frame.
R2) If all the links in the Internet were to provide reliable delivery service, would the TCP reliable delivery service be redundant? Why or why not?
Answer:
Each link can make sure that an IP datagram sent over link which can be received at the other end of the link and there is no errors during this process. However, IP datagrams may not be in the proper order when they arrive at the ultimate
…show more content…
If A sends thousands of IP datagrams to B with each encapsulating frame addressed to the MAC address of B, will C’s adapter process these frames? If so, will C’s adapter pass the IP datagrams in these frames to the network layer C? How would your answers change if A sends frames with the MAC broadcast …show more content…
if A sends frames with the MAC broadcast address, if the LAN broadcast address is used, the adapter of C will both process the frames and then pass the datagrams up to the protocol stack.
R11) Why is an ARP query sent within a broadcast frame? Why is an ARP response sent within a frame with a specific destination MAC address?
Answer:
The reason why an ARP is query sent within a broadcast frame is that the adapter address of querying host does not correspond to the IP address. The sending node knows the adapter address to which the response should be sent as for the response, and as a result, it is not essential to send a broadcast frame.
P1) Suppose the information content of a packet is the bit pattern
1110 0110 1001 1101 and an even parity scheme is being used. What would the value of the field containing the parity bits be for the cases of a two-dimensional parity scheme? Your answer should be such that a minimum-length checksum field is used.
Answer:
11101 10111 10010 11011
2: Data Link Layer: It take care of errors in physical layer. The main aim of the data link layer is to controls the flow of frame synchronization and transmission protocol. The data link layer divided in to two types. They are Media Access Control (MAC) and Logical Link Control (LLC).
Layer 6: Presentation - Layer 6 takes the data provided by the Application layer and converts it into a standard format that the other layers can understand.
The most common type of network and the frames that come with it is Institute of Electrical and Electronics Engineers (IEEE), also known as:
• “Data Link -Whenever two or more nodes share the same physical medium (for example, several computers plugged
pieces. The data packet is sent to a gateway computer which either recognizes the address
It is operating on best effort delivery model, i.e. it does not guarantee delivery, nor does it assure proper sequencing or avoidance of duplicate delivery. These aspects, including data integrity, are addressed by an upper layer transport protocol, such as the Transmission
This makes sure the data transferred is in the right order, error free and reliable from beginning to end. The Network Layer is the third layer of the model and its function is to interpret the network addresses into physical addresses and figure out how to direct them from the sender to the receiver. The next layer is the Data Link Layer, this is the second layer and it separates the data it receives from the Network layer into specific frames so they can be transmitted by the Physical layer. Frames are packages for moving data, they include the raw data, the sender and receiver’s addresses, as well as error checking and control information. This makes sure the frames are delivered to their destination without any problems. The physical layer is the first layer and the lowest, the protocols at this layer recognize and receive the frames from the Data Link layer. They also monitor data error and set data transmission
Module 1 establishes the framework of networking standards and protocols for the rest of the class. The module introduces data communications and defines their components and the types of data exchanged. You will learn how different types of data are represented and how data is flowed through the network.
28. Pg 173 IP Address. Hosts have logical IP addresses (changeable) TCP/IP is in the network layer. The MAC address is the physical layer. Mac addresses cannot be changed. ARP is used to connect a logical IP with a MAC.
the server binds the socket S to a local address, which is optional for a client. The server then
In general, on the internet, every packet follows 5 layers of structures (Application, Transport, Network, Data Link, and Physical). Since I have to talk about Connection-Oriented and Connectionless as a service, I will focus on the Transport layer because they are part of this layer. It allows multiple applications to use one network connection simultaneously, the layer will create ports on your computer allowing them to be reserved and used by the Application layer. Let's say that port 3600 will be used to send a message to port 80 of some other computer, whenever the port is ready to send a message, it passed on to Transport layer. In this layer, it wraps the message inside the Segment which contains some additional
Router segments the network. The Router will not allow broadcasting of data to another network, particularly if the IP address is not from the outside network where the source node belongs. If the destination is not part of the same network where the source node is located then the router directly connected to it will analyze the packet
What is the relative humidity when the air temperature is 75 degrees Fahrenheit and the Wet Bulb temperature is 65 degrees Fahrenheit?
There are two types of Internet Protocol (IP) traffic, such as Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Some of the features that UDP possesses that are not provided by TCP/IP. First, UDP is a connectionless protocol (No handshake), which means packets sent from one node to another without making sure whether any packet may be lost during the transfer. TCP, on the other hand, makes sure to establish a connection in order to send the packets from one node to another without losing any packets. It is also known as handshake process, where nodes synchronize (SYN),
17. Reducing the variations in our product or services is an important key to perceived quality TRUE