Roman Katoliko
NT1210
CHAPTER 3: Building TCP/IP Networks
Lab 3.1: Network Reference Models
Ex 3.1.1
What would happen if wireless devices were not governed by the Wi-Fi Alliance and each vendor had its own standards and protocol? What impact would this have on your personal life or business communications?
If each vendor had their own standards and protocols, we would have a harder time making devices that we use every day to inter-operate. Imagine buying specific BRAND of ROUTER for a SPECIFIC computer just to use the internet; so if you have a Sony computer you would also need a Sony wireless router to connect to the internet via provided Sony made routers. We would to have multiple routers depending on the devices we own
…show more content…
It provides the hardware means of sending and receiving data on a carrier, including defining cables, cards and physical aspects.
2. DATA LINK (Layer2) – divided into 2 sub layers: MAC, which controls how a computer on the network gains access to the data and permission to transmit it, and LLC which controls frame synchronization. At this layer, data packets are encoded and decoded into bits. It furnishes transmission protocol knowledge and management and handles errors in the physical layer, flow control and frame synchronization.
3. NETWORK (layer 3) – Provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node.
4. TRANSPORT (layer 4) – provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control.
5. SESSION (layer 5) – this layer establishes, managers and terminates connections between applications
6. PRESENTATION (layer 6) – this layer provides independence from differences in data representation. E.g. encryption.
7. APPLICATION (layer 7) – This layer supports application and end-user process.
Ex 3.2.2
Ex 3.2.3
Briefly explain the deencapsulation steps in the communication from host B receiving a message from Host A destined for an active application.
A. Converts data to bits for transmission
B. Packages the data for end to end transport
C. Adds the data-link header and trailer
D.
3: Network Layer: The use of network layer is switching and routing technologies. It demonstrates logical path and virtual circuits for transferring data from one node to
The most common type of network and the frames that come with it is Institute of Electrical and Electronics Engineers (IEEE), also known as:
Layer 4: Transport - This layer maintains flow control of data and provides for error checking and recovery of data between the devices.
2. Enterprise networks typically use LAN _____ at each site to connect devices using some type of media.
The fifth layer is the session layer this establishes a connection,this layer makes and sets up the connection using co ordinates and could terminate conversations links. the session layer produces services that make authentication after an interruption and not only that but it can reconnect.and as well as the transporting layer it can also have the TCP and the UDP can provide services for all most all applications.An application layer is an abstraction layer that specifies the shared protocols and interface methods used by hosts in a communications network. The application layer abstraction is used in both of the standard models of computer networking; the Internet Protocol Suite (TCP/IP) and the Open Systems Interconnection model (OSI model).Although both models use the same term for their respective highest level layer, the detailed definitions and purposes are different.In TCP/IP, the application layer contains the communications protocols and interface methods used in process-to-process communications
• “Application - The Application Layer is the layer that most network users are exposed to, and is the level at which human communication happens. HTTP, FTP, and SMTP are examples of the application layer protocols the Patton-Fuller will now be utilizing for communicating electronically” (Network Design, 2012).
gateway. When the data packets reach their destination, they fit back together to for the
It is operating on best effort delivery model, i.e. it does not guarantee delivery, nor does it assure proper sequencing or avoidance of duplicate delivery. These aspects, including data integrity, are addressed by an upper layer transport protocol, such as the Transmission
Module 1 establishes the framework of networking standards and protocols for the rest of the class. The module introduces data communications and defines their components and the types of data exchanged. You will learn how different types of data are represented and how data is flowed through the network.
The OSI Model is a model is used to define how data is theoretically passed on a network. Each layer is responsible and has its own duties for a network. The name of layer 3 in the OSI is the Network Layer. This layer is responsible for creating the paths for the transmission of data across the network. This layer provides routing and switching capabilities, as well as, internetworking, congestion control, and packet sequencing (Beal, 1999).
Sockets is the form of communication (UDP and TCP) use the socket abstraction, which provides an endpoint for communication between processes to processes. Interprocess communication consists of transmitting a message between a socket in one process and a socket in another process. As the IP packets underlying UDP and TCP are sent to Internet addresses.
The internet layer is built up of four core protocols: IP, IGMP, ICMP and ARP. Internet protocol (IP) is responsible for routing, IP addressing and breakdown/reassembly of data packets, address resolution protocol (ARP) is responsible for mapping an IP address to a device on the local network, internet control message protocol (ICMP) provides diagnostic information and error reports on lost packets, internet group management protocol (IGMP) controls who receives IP datagrams in a single transmission. The transport layer is built up of two core protocols: TCP and UDP. Transmission control protocol (TCP) sequences and acknowledges packets sent and their recovery when lost in transmission allowing the computer to make and maintain network conversations where applications exchange data, defined as a connection-oriented protocol meaning the connection is maintained until the programs has finished exchanging data. User datagram protocol (UDP) This is used to transfer small amounts of data when the use of error correction isn’t needed increasing the speed of the transmission, common in multi-player video games as the user will not need to receive packets of past events in the game so the error correction featured in (TCP) would be
With this in place Kudler will keep using the ANSI standards when designing and developing the new systems. Along with these standards the system will need to work on a common communication protocol in order for all devices to be able to talk to each other as well as transfer data and other information correctly and efficiently.
Standards are put in place to make everything work together error free. Because Stability, Consistency, Minimization of packet errors.
The transport layer: This layer determines how the packets are transported such as the order and what to do if there are errors. The purpose of this layer is to make sure the data be transported correctly. Besides, due to the limitation of physic (maximum IP packet size is 65535bits), the speed of transportation is limited. As a result, this layer needs break big data in to small packets. This can also collect small data into a big packet to reduce unnecessary transmission, which can improve the transmitting speed. Example protocols are TCP, UDP, SCTP.