Name: 5 points
R1, R2, R9, R10, R11 (10 points each)
P1, P2, P14 (15 points each)
R1) Consider the transportation analogy in Section 6.1.1 .If the passenger is analogous to a datagram, what is analogous to the link layer frame? Answer: The transportation mode, such as the train, is analogous to the link layer frame.
R2) If all the links in the Internet were to provide reliable delivery service, would the TCP reliable delivery service be redundant? Why or why not?
Answer:
Each link can make sure that an IP datagram sent over link which can be received at the other end of the link and there is no errors during this process. However, IP datagrams may not be in the proper order when they arrive at the ultimate
…show more content…
If A sends thousands of IP datagrams to B with each encapsulating frame addressed to the MAC address of B, will C’s adapter process these frames? If so, will C’s adapter pass the IP datagrams in these frames to the network layer C? How would your answers change if A sends frames with the MAC broadcast …show more content…
if A sends frames with the MAC broadcast address, if the LAN broadcast address is used, the adapter of C will both process the frames and then pass the datagrams up to the protocol stack.
R11) Why is an ARP query sent within a broadcast frame? Why is an ARP response sent within a frame with a specific destination MAC address?
Answer:
The reason why an ARP is query sent within a broadcast frame is that the adapter address of querying host does not correspond to the IP address. The sending node knows the adapter address to which the response should be sent as for the response, and as a result, it is not essential to send a broadcast frame.
P1) Suppose the information content of a packet is the bit pattern
1110 0110 1001 1101 and an even parity scheme is being used. What would the value of the field containing the parity bits be for the cases of a two-dimensional parity scheme? Your answer should be such that a minimum-length checksum field is used.
Answer:
11101 10111 10010 11011
Layer 6: Presentation - Layer 6 takes the data provided by the Application layer and converts it into a standard format that the other layers can understand.
Router segments the network. The Router will not allow broadcasting of data to another network, particularly if the IP address is not from the outside network where the source node belongs. If the destination is not part of the same network where the source node is located then the router directly connected to it will analyze the packet
The most common type of network and the frames that come with it is Institute of Electrical and Electronics Engineers (IEEE), also known as:
the server binds the socket S to a local address, which is optional for a client. The server then
28. Pg 173 IP Address. Hosts have logical IP addresses (changeable) TCP/IP is in the network layer. The MAC address is the physical layer. Mac addresses cannot be changed. ARP is used to connect a logical IP with a MAC.
In general, on the internet, every packet follows 5 layers of structures (Application, Transport, Network, Data Link, and Physical). Since I have to talk about Connection-Oriented and Connectionless as a service, I will focus on the Transport layer because they are part of this layer. It allows multiple applications to use one network connection simultaneously, the layer will create ports on your computer allowing them to be reserved and used by the Application layer. Let's say that port 3600 will be used to send a message to port 80 of some other computer, whenever the port is ready to send a message, it passed on to Transport layer. In this layer, it wraps the message inside the Segment which contains some additional
The User Datagram Protocol (UDP) is defined for use with IP network layer protocol in the transport layer protocol. It provides a best-effort datagram service to an End System (IP host). It uses a simple connectionless transmission model with a minimum of protocol mechanism. It uses no handshaking dialogues, and thus the user's program is exposed to any unreliability of the underlying network protocol. There is no guarantee of delivery, ordering, or duplicate protection. UDP provides checksums for data integrity, and port numbers for addressing different functions at the source and destination of the datagram.
pieces. The data packet is sent to a gateway computer which either recognizes the address
2: Data Link Layer: It take care of errors in physical layer. The main aim of the data link layer is to controls the flow of frame synchronization and transmission protocol. The data link layer divided in to two types. They are Media Access Control (MAC) and Logical Link Control (LLC).
You will discover different network topologies and different types of networks: LANs, WANs, and internetworks (internets). The concept of switching is discussed to show how small networks can be combined to create larger ones. You will learn about the Internet: its early history, the birth of the Internet, and the issues related to the Internet today. This module covers standards and standards organizations.
This makes sure the data transferred is in the right order, error free and reliable from beginning to end. The Network Layer is the third layer of the model and its function is to interpret the network addresses into physical addresses and figure out how to direct them from the sender to the receiver. The next layer is the Data Link Layer, this is the second layer and it separates the data it receives from the Network layer into specific frames so they can be transmitted by the Physical layer. Frames are packages for moving data, they include the raw data, the sender and receiver’s addresses, as well as error checking and control information. This makes sure the frames are delivered to their destination without any problems. The physical layer is the first layer and the lowest, the protocols at this layer recognize and receive the frames from the Data Link layer. They also monitor data error and set data transmission
• “Data Link -Whenever two or more nodes share the same physical medium (for example, several computers plugged
What is the relative humidity when the air temperature is 75 degrees Fahrenheit and the Wet Bulb temperature is 65 degrees Fahrenheit?
Internet Protocol (IP) datagrams may arrive in a seemingly random order of chunks that the receiving IP entity must continuously collect until it can reconstruct the original datagram. Consider that the receiving IP entity possesses a buffer for assembling the original datagram's data field. The buffer will comprise of chunks of data and "holes" between them corresponding to data not yet received.
17. Reducing the variations in our product or services is an important key to perceived quality TRUE