Name: 5 points
R1, R2, R9, R10, R11 (10 points each)
P1, P2, P14 (15 points each)
R1) Consider the transportation analogy in Section 6.1.1 .If the passenger is analogous to a datagram, what is analogous to the link layer frame? Answer: The transportation mode, such as the train, is analogous to the link layer frame.
R2) If all the links in the Internet were to provide reliable delivery service, would the TCP reliable delivery service be redundant? Why or why not?
Answer:
Each link can make sure that an IP datagram sent over link which can be received at the other end of the link and there is no errors during this process. However, IP datagrams may not be in the proper order when they arrive at the ultimate
…show more content…
If A sends thousands of IP datagrams to B with each encapsulating frame addressed to the MAC address of B, will C’s adapter process these frames? If so, will C’s adapter pass the IP datagrams in these frames to the network layer C? How would your answers change if A sends frames with the MAC broadcast …show more content…
if A sends frames with the MAC broadcast address, if the LAN broadcast address is used, the adapter of C will both process the frames and then pass the datagrams up to the protocol stack.
R11) Why is an ARP query sent within a broadcast frame? Why is an ARP response sent within a frame with a specific destination MAC address?
Answer:
The reason why an ARP is query sent within a broadcast frame is that the adapter address of querying host does not correspond to the IP address. The sending node knows the adapter address to which the response should be sent as for the response, and as a result, it is not essential to send a broadcast frame.
P1) Suppose the information content of a packet is the bit pattern
1110 0110 1001 1101 and an even parity scheme is being used. What would the value of the field containing the parity bits be for the cases of a two-dimensional parity scheme? Your answer should be such that a minimum-length checksum field is used.
Answer:
11101 10111 10010 11011
Layer 6: Presentation - Layer 6 takes the data provided by the Application layer and converts it into a standard format that the other layers can understand.
Router segments the network. The Router will not allow broadcasting of data to another network, particularly if the IP address is not from the outside network where the source node belongs. If the destination is not part of the same network where the source node is located then the router directly connected to it will analyze the packet
The most common type of network and the frames that come with it is Institute of Electrical and Electronics Engineers (IEEE), also known as:
4. Exchange state – In this state DBD (Database Descriptor) packets are exchanged. DBDs contain LSAs (Link State Advertisement) headers. The Routers will use this information to see what LSAs need to be exchanged.
the server binds the socket S to a local address, which is optional for a client. The server then
28. Pg 173 IP Address. Hosts have logical IP addresses (changeable) TCP/IP is in the network layer. The MAC address is the physical layer. Mac addresses cannot be changed. ARP is used to connect a logical IP with a MAC.
In general, on the internet, every packet follows 5 layers of structures (Application, Transport, Network, Data Link, and Physical). Since I have to talk about Connection-Oriented and Connectionless as a service, I will focus on the Transport layer because they are part of this layer. It allows multiple applications to use one network connection simultaneously, the layer will create ports on your computer allowing them to be reserved and used by the Application layer. Let's say that port 3600 will be used to send a message to port 80 of some other computer, whenever the port is ready to send a message, it passed on to Transport layer. In this layer, it wraps the message inside the Segment which contains some additional
It is operating on best effort delivery model, i.e. it does not guarantee delivery, nor does it assure proper sequencing or avoidance of duplicate delivery. These aspects, including data integrity, are addressed by an upper layer transport protocol, such as the Transmission
pieces. The data packet is sent to a gateway computer which either recognizes the address
2: Data Link Layer: It take care of errors in physical layer. The main aim of the data link layer is to controls the flow of frame synchronization and transmission protocol. The data link layer divided in to two types. They are Media Access Control (MAC) and Logical Link Control (LLC).
Module 1 establishes the framework of networking standards and protocols for the rest of the class. The module introduces data communications and defines their components and the types of data exchanged. You will learn how different types of data are represented and how data is flowed through the network.
What is the relative humidity when the air temperature is 75 degrees Fahrenheit and the Wet Bulb temperature is 65 degrees Fahrenheit?
There are two types of Internet Protocol (IP) traffic, such as Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Some of the features that UDP possesses that are not provided by TCP/IP. First, UDP is a connectionless protocol (No handshake), which means packets sent from one node to another without making sure whether any packet may be lost during the transfer. TCP, on the other hand, makes sure to establish a connection in order to send the packets from one node to another without losing any packets. It is also known as handshake process, where nodes synchronize (SYN),
Finally, the application layer of System B passes the information to the recipient application program to complete the communication process.
17. Reducing the variations in our product or services is an important key to perceived quality TRUE