1. List the layers of the OSI model and the TCP/IP protocol suite (the Internet Model)
Following are the list of OSI model and TCP/IP model:
OSI layers
Layer 7: The application layer. …
Layer 6: The presentation layer. …
Layer 5: The session layer. …
Layer 4: The transport layer. …
Layer 3: The network layer. …
Layer 2: The data-link layer. …
Layer 1: The physical layer
TCP/IP model layers
Application layer
The transport layer
The network layer
The data-link layer
2. How do the layers of the OSI correlate to the layers of the TCP/IP protocol suite?
The TCP/IP protocol suit contains four layers including host-to-network, internet, transport, and application. In case of OSI model, host-to-network layer is merged with combination of the physical and data link layers. The internet layer is merged with network layer, and application layer is merged with session, presentation, and application layers with transport layer in TCP/IP.
3. Which layers of the TCP/IP protocol suite are the network support layers and which layers are the user support layers?
Network support layers are data link layer and network layer. User support layer is application layer.
4. What is data encapsulation (with respect to Questions 1-3)?
Data encapsulation focuses on sending data in which data can be segmented within successive layers of control for transmission across network. Data Encapsulation deals with sending and receiving of data from source. The data encapsulated with protocol information at each OSI reference layer model. Therefore, each layer communicates with it beside layer on the destination. The network device sends a message then it takes a form of data packet. This data packet is added with a header that contains some information regarding destination. Therefore, the data packet is encapsulated under this header file and send to the destination. This also helps in providing security to the data and information stored in the data packet.
5. What are the responsibilities of the Data Link layer?
Following are the list of responsibilities of data link layer:
6. What is the difference between Network layer and Transport layer delivery?
The main difference is related to the delivery of packets from source to destination across multiple networks. Transport layer has been responsible for the source to destination delivery of all message.
7. If the Data link layer can detect errors between hops, why do you think we need another mechanism at the Transport layer?
Transport layer helps in becoming a bridge between applications executing in several hosts. Therefore, error detection is required in data link layer.
8. What are the responsibilities of the Network layer?
Following are list of responsibilities of network layer:
9. What are the responsibilities of the Transport layer?
Following are list of responsibilities of transport layer:
10. What is the difference between a port address, a logical address and a physical address?
Logical address is generated by CPU with respect to program. A physical address is an address in a network card. Computer components are addressed by port address.
11. Name some services provided by the Application layer
Following are the services provided by application layer:
12. What are the advantages of combining Session, Presentation and Application layers of the OSI model to a single layer in the TCP/IP protocol suite?
The OSI model consists of seven layers and TCIP/IP has been consisting of five layers. The combination of session, presentation and application layer in TCP/IP helps in reducing complexity of the layers of model. It also helps in increasing the speed of data transfer in the model. It also helps in providing a well-mannered structure to the TCP/IP model.
13. What is an advantage of a hierarchical name space over a flat name space for a system the size of the Internet?
Searching a name in hierarchical structure has been faster that searching in a linear system in case of large name space. The binary search can be used in the hierarchical name space and sequential search is used in the linear name space. Hierarchical name space are flexible and less complex as compared to the flat name space. Therefore, searching can be fast in the hierarchical name space.
14. What is the difference between a primary and a secondary DNS?
DNS refers to the Domain Name System which is the largest database in the world. It contains all registration data and domain name. There are two types of DNS server including primary and secondary DNS. A primary DNS server has been responsible in order to reading data related to domain zone. This server is also responsible for creating a communication bridge with secondary server. Therefore, when request is issued to a server, it starts travelling through primary DNS server and then allocate to secondary server.
The secondary DNS server has been responsible for the slave server that is responsible for obtaining data from server. Secondary DNS server does not obtain data form the primary DNS server.
15. Why do we need POP3 or IMAP for electronic mail?
IMAP refers to Internet Message Access Protocol. POP refers to Post Office Protocol. Both of these protocols help in reading emails from local access using a third party application. POP helps in downloading emails from the server for permanent storage in local devices. However, IMAP leaves on them on the server and caches the memory in the local storage. Therefore, IMAP helps in implementing cloud computing in the email reading process.
16. What is the purpose of FTP?
File transfer protocol is used for transferring files between computers connected in a network. FTP ca be used for transferring files between an account and commuter and accessing online software module. FTP helps in providing keen approach in downloading the data and files from the server. The access it the files and documents over the server is done with the help of file transfer protocol. The use of the FTP ca be done to maintain access to the local server of the computer.
17. What anonymous FTP?
Anonymous File Transfer Protocol helps user to log in to FTP server using a common login procedure and get access to the file over the server. It also helps in downloading files for the FTP server.
18. How is HTTP related to WWW?
HTTP stands for Hyper Text Transfer Protocol. It is a underlying protocol that helps in defining messages in order they are formatted and transmitted over the World Wide Web. It is a file transfer protocol that helps in facilitating access to WWW.
19. What is a URL and what are its components?
URL stands for Uniform Resource Locator has been a specific type of universal resource identifier (URI). It helps in locating an existing resource from the Internet. There are four components of URL:
20. What is a proxy server and how is it related to HTTP?
A proxy server can be relate with the application level gateway that helps in creating gateway between local network and large scale network including internet. It helps in providing increase in performance and security. A proxy server helps in creating a copy of responses that have been recently requested by the user. Therefore, when client has a request, cache of proxy server is required to check before request transferred to normal server.
21. What does HTML stand for and what is its function?
HTML stands for Hyper Text Markup language. HTML is used for creating webpages for displaying over web browsers.
22. What are the SNMP components?
Following are the SNMP components:
Managed devices
Agents
Network management systems
23. List the SNMP v1 and v2 message types and their function
SNMP v1 helps in providing fundamental functionalities for data polling and is relatively easy to use.
SNMP v2 helps in supporting 64-bit counters but still sends critical data as clear text, so it does not really enhance security.
24. Can two devices connected to the same Frame Relay network use the same DLCIs?
DLCIs refers to a unique interface. A switch connected to a DCLI at each virtual connection in an interface. Therefore, two several connections depending on two various interfaces might contain same DLCI.
25. Compare an SVC with a PVC
PVC” is refered to virtual circuit that is available permanently. It is a category of virtual circuit in which end points do not signal the circuit. However, “SVC” is a circuit that has been on-demand circuit maintained by user signals. “PVC” is a permanent circuit while “SVC” needs to be re-established every time when there is a need for a data transfer.
26. How is an ATM virtual connection identified?
ATM is connected by two virtual numbers including virtual path identifier (VPI) and virtual circuit identifier (VCI)
27. Why is SONET called a synchronous network?
SONET is a standard that helps in optical telecommunication transport formulated by Exchange Carriers Standards Association (ECSA). It helps in reducing the requirements of equipment’s and increase network reliability. IT also helps in synchronizing signals within digital transitions. It is a technology that helps in carrying various signals of several capacities through a synchronous channel. This can be categorized by a byte-interleaved multiplexing scheme. IN synchronous system, SONET is able to gain average frequency of all clocks in system. Every clock need to be traced back to a highly stable reference. A single clock is able to handle all timings of equipment and transmission across the entire network.
Bohuslava, J., Martin, J., & Igor, H. (2017, January). TCP/IP protocol utilisation in process of dynamic control of robotic cell according industry 4.0 concept. In Applied Machine Intelligence and Informatics (SAMI), 2017 IEEE 15th International Symposium on (pp. 000217-000222). IEEE.
Conti, M., & Giordano, S. (2014). Mobile ad hoc networking: milestones, challenges, and new research directions. IEEE Communications Magazine, 52(1), 85-96.
Goralski, W. (2017). The illustrated network: how TCP/IP works in a modern network. Morgan Kaufmann.
Johannisson, B. (2017). Networking and entrepreneurial growth. The Blackwell handbook of entrepreneurship, 368-386.
Kreutz, D., Ramos, F. M., Verissimo, P. E., Rothenberg, C. E., Azodolmolky, S., & Uhlig, S. (2015). Software-defined networking: A comprehensive survey. Proceedings of the IEEE, 103(1), 14-76.
Nunes, B. A. A., Mendonca, M., Nguyen, X. N., Obraczka, K., & Turletti, T. (2014). A survey of software-defined networking: Past, present, and future of programmable networks. IEEE Communications Surveys & Tutorials, 16(3), 1617-1634.
Quan, W., Xu, C., Vasilakos, A. V., Guan, J., Zhang, H., & Grieco, L. A. (2014, June). TB2F: Tree-bitmap and bloom-filter for a scalable and efficient name lookup in Content-Centric Networking. In Networking (pp. 1-9).
Shang, W., Yu, Y., Droms, R., & Zhang, L. (2016). Challenges in IoT networking via TCP/IP architecture. Technical Report NDN-0038. NDN Project.
Shojafar, M., Cordeschi, N., Abawajy, J. H., & Baccarelli, E. (2015, December). Adaptive energy-efficient qos-aware scheduling algorithm for tcp/ip mobile cloud. In Globecom Workshops (GC Wkshps), 2015 IEEE (pp. 1-6). IEEE.
Simmons, J. M. (2014). Optical network design and planning. Springer.
Vasudevan, S. K., Prakash, P., Sudhakar, P., & Srinivasan, S. (2015). A Study on Sonet and SDH with their Defects in Optical Network. Indian Journal of Science and Technology, 8(29).
Xylomenos, G., Ververidis, C. N., Siris, V. A., Fotiou, N., Tsilopoulos, C., Vasilakos, X., … & Polyzos, G. C. (2014). A survey of information-centric networking research. IEEE Communications Surveys and Tutorials, 16(2), 1024-1049.
Yasukata, K., Honda, M., Santry, D., & Eggert, L. (2016, June). StackMap: Low-Latency Networking with the OS Stack and Dedicated NICs. In USENIX Annual Technical Conference(pp. 43-56).
Zhang, L., Afanasyev, A., Burke, J., Jacobson, V., Crowley, P., Papadopoulos, C., … & Zhang, B. (2014). Named data networking. ACM SIGCOMM Computer Communication Review, 44(3), 66-73.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download