Question 1: A single device can host multiple services by having different port numbers in place in the transport layer. These port numbers are dynamically generated by the device that is sending the information so that a conversation can be initiated, having this allows for many conversations to take place at the same time on each different port. When it comes to deciding how different sides know what ports to use there are things called Well-known ports and these port numbers can be used in for services and applications. There are also registered ports and these ports are assigned for a specific process or service and are not changed. The other ports that are used are called dynamic ports and these ports are used to first determine what …show more content…
UDP on the other hand receives packets in the order in which they arrive and not by the order they were sent. UDP acknowledges that it will receive all packets and as long as all packets are received the full data that is being sent will be intact and whole. This difference also works in line with TCP authenticating everything that goes through it. While UDP does not have an authentication build to it just takes the packets as they come if they are coming from a known sender that way no time is wasted. That is why both methods are needed because somethings do not require the authentication method while other need to go through it for security purposes. Question 3: Subnet Mask is 255.255.255.224, 199.88.1.0/27 first four: 199.88.1.32, 199.88.1.64, 199.88.1.96, 199.88.1.128----------Subnet Mask is 255.255.255.240 199.88.1.0/28 first four: 199.88.1.16, 199.88.1.32, 199.88.1.48, 199.88.1.64 Question 4: Best effort delivery is described as when an IP cannot manage or recover packets that have been lost or corrupted during the transport process. This happens because packets do not carry information that can tell the sender that they arrived or if they didn’t arrive so its up to an application at the destination end to inform the sender whether or not a whole set of data arrived. Question 6: Physical Addresses differ from Virtual addresses in which they are actually
8) You are given the Class B network address: 172.25.0.0. From this network, if you needed to create 8 subnets, how many bits would need to be borrowed at a minimum and how many hosts could you have per subnet?
37) DHCP ________ are configurable parameters that determine which subnets the DHCP server will serve.
The fifth layer is the session layer this establishes a connection,this layer makes and sets up the connection using co ordinates and could terminate conversations links. the session layer produces services that make authentication after an interruption and not only that but it can reconnect.and as well as the transporting layer it can also have the TCP and the UDP can provide services for all most all applications.An application layer is an abstraction layer that specifies the shared protocols and interface methods used by hosts in a communications network. The application layer abstraction is used in both of the standard models of computer networking; the Internet Protocol Suite (TCP/IP) and the Open Systems Interconnection model (OSI model).Although both models use the same term for their respective highest level layer, the detailed definitions and purposes are different.In TCP/IP, the application layer contains the communications protocols and interface methods used in process-to-process communications
It is operating on best effort delivery model, i.e. it does not guarantee delivery, nor does it assure proper sequencing or avoidance of duplicate delivery. These aspects, including data integrity, are addressed by an upper layer transport protocol, such as the Transmission
If we take the 172.16.0.0 range, that is /12. So that means that the network mask is 255.240.0.0. If we take 256-240 = 16 we get the block size which is 16. So that means that the range is from 172.16.0.0 to 172.31.255.255 because 172.32.0.0 is the next block and would be a public IP.
Sockets is the form of communication (UDP and TCP) use the socket abstraction, which provides an endpoint for communication between processes to processes. Interprocess communication consists of transmitting a message between a socket in one process and a socket in another process. As the IP packets underlying UDP and TCP are sent to Internet addresses.
Transmission Control Protocol/Internet Protocol (TCP/IP) are the basic communication protocols, which were designed to provide low level support for internetworking. This term is generally also used to refer to a more generalised collection of protocols developed by the internet community and U.S. Department of Defence.
3. Since UDP doesn’t have an acknowledgement protocol built in, RPC should have one written in so that the chance of lost packets is reduced (Dordal, 2016).
The internet layer is built up of four core protocols: IP, IGMP, ICMP and ARP. Internet protocol (IP) is responsible for routing, IP addressing and breakdown/reassembly of data packets, address resolution protocol (ARP) is responsible for mapping an IP address to a device on the local network, internet control message protocol (ICMP) provides diagnostic information and error reports on lost packets, internet group management protocol (IGMP) controls who receives IP datagrams in a single transmission. The transport layer is built up of two core protocols: TCP and UDP. Transmission control protocol (TCP) sequences and acknowledges packets sent and their recovery when lost in transmission allowing the computer to make and maintain network conversations where applications exchange data, defined as a connection-oriented protocol meaning the connection is maintained until the programs has finished exchanging data. User datagram protocol (UDP) This is used to transfer small amounts of data when the use of error correction isn’t needed increasing the speed of the transmission, common in multi-player video games as the user will not need to receive packets of past events in the game so the error correction featured in (TCP) would be
In general, on the internet, every packet follows 5 layers of structures (Application, Transport, Network, Data Link, and Physical). Since I have to talk about Connection-Oriented and Connectionless as a service, I will focus on the Transport layer because they are part of this layer. It allows multiple applications to use one network connection simultaneously, the layer will create ports on your computer allowing them to be reserved and used by the Application layer. Let's say that port 3600 will be used to send a message to port 80 of some other computer, whenever the port is ready to send a message, it passed on to Transport layer. In this layer, it wraps the message inside the Segment which contains some additional
7. Each host on a TCP/IP network should be configured with a number of mandatory and optional configuration items
i) Application layer makes use of the ftp protocol. FTP uses TCP only but it does not use UDP. In normal circumstances an application layer will only use one or the other hence no need to use UDP for its transport needs.
Standards are put in place to make everything work together error free. Because Stability, Consistency, Minimization of packet errors.
There are two types of Internet Protocol (IP) traffic, such as Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Some of the features that UDP possesses that are not provided by TCP/IP. First, UDP is a connectionless protocol (No handshake), which means packets sent from one node to another without making sure whether any packet may be lost during the transfer. TCP, on the other hand, makes sure to establish a connection in order to send the packets from one node to another without losing any packets. It is also known as handshake process, where nodes synchronize (SYN),
The application layer: this layer allows different applications to communicate with each other’s. In order to exchange different data over the network connection, the protocols included in this layer set up the standards such as DNS, HTTP, FTP. The data coded in this layer will be encapsulated to transport layer for further packing.