0% found this document useful (0 votes)
18 views7 pages

azxc

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views7 pages

azxc

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

1. List the layers of the Internet model.

 Physical layer
 Data link layer
 Network layer.
 Transport layer and
 Application layer.

2. Which layers in the Internet model are the network support layers?

 Physical
 Data link
 Network layers

3. Which layer in the internet model is the user support layer?

 Application layer.
 Session layer
 Presentation layer

4. What is the difference between network layer delivery and transport layer
delivery?

 The transport layer is responsible for process-to-process delivery of the


entire message, but the network layer oversees host-to-host delivery of
individual packets.

5. What is a peer-to-peer process?

 Peer-to-peer process is a decentralized network architecture in which


participants, called peers, interact directly with each other without needing
a central authority or server. In a P2P network, each participant acts as
both a client and a server, enabling them to share resources and services
directly with other peers.

 The processes at each machine that communicate at a given layer.


Physical Layer has a direct link between 2 devices, while other layers
have to pass the information down to the lower layers on the sender
device by adding extra bits at each layer, and the receiver device unwraps
the message at each layer moving upwards till it finally reaches the
corresponding communicating layer.
6. How does information get passed from one layer to the next in the Internet
model

 Each layer at the sending site uses the services of the layer immediately
below it. The sender at the higher layer uses the services of the middle
layer. The middle layer uses the services of the lower layer. The lower
layer uses the services of the carrier.

7. What are headers and trailers, and how do they get added and removed?

 Headers and trailers are control data added at the beginning and the end
of each data unit at each layer of the sender and removed at the
corresponding layers of the receiver. They provide source and destination
addresses, synchronization points, information for error detection etc.

8. What are the concerns of the physical layer in the Internet model?

 Physical topology
 Representation of bits
 Type of encoding
 Synchronization of bits
 Transmission rate and mode
 Line Configuration

9. What are the responsibilities of the data link layer in the Internet model?

 Framing data bits


 Physical addressing
 Data rate means flow control.
 Error Control
 Access Control

10. What are the responsibilities of the network layer in the internet model?

 Logical addressing
 Routing

11. What are the responsibilities of the transport layer in the internet model?

 Segmentation and reassembly


 Connection Control
 Flow control
 Error control

12. What is the difference between a port address, a logical address, and a
physical address?

 Logical addresses are necessary for universal communications that are


independent of underlying physical networks. Physical addresses are not
adequate in an internetwork environment where different networks can
have different address formats. A universal addressing system is needed
in which each host can be identified uniquely, regardless of the underlying
physical network. The IP address and the physical address are necessary
for a quantity of data to travel from a source to the destination host.
However, arrival at the destination host is not the final objective of data
communications on the Internet. A system that sends nothing but data
from one computer to another is not complete. Today, computers are
devices that can run multiple processes at the same time and that is the
port address.

13. Name some services provided by the application layer in the Internet
model.

 Network virtual terminal. A network virtual terminal is a software version


of a physical terminal, and it allows a user to log on to a remote host. To
do so, the application creates a software emulation of a terminal at the
remote host. The user's computer talks to the software terminal which, in
turn, talks to the host, and vice versa. The remote host believes it is
communicating with one of its own terminals and allows the user to log on.

 File transfer, access, and management. This application allows a user to


access files in a remote host (to make changes or read data), to retrieve
files from a remote computer for use in the local computer, and to manage
or control files in a remote computer locally.

 Mail services. This application provides the basis for e-mail forwarding
and storage.

 Directory services. This application provides distributed database


sources and access for global information about various objects and
services.
14. How do the layers of the Internet model correlate to the layers of the OSI
model?

 The layers in the models are compared with each other. The physical layer
and the data link layer of the OSI model correspond to the link layer of the
TCP/IP model.
 The session layer, the presentation layer and the application layer of the
OSI model together form the application layer of the TCP/IP model.
 The network layers and the transport layers are the same in both models.
 In both models, data are mainly used to convert raw data into packets
and help them reach their destination node.

15. How are OSI and ISO related to each other?

 International Standards Organization (ISO) is a multinational body


dedicated to worldwide agreement on international standards. An ISO
standard that covers all aspects of network communications is the Open
Systems Interconnection model. It was first introduced in the late 1970s.
An open system is a set of protocols that allows any two different systems
to communicate regardless of their underlying architecture. The purpose
of the OSI model is to show how to facilitate communication between
different systems without requiring changes to the logic of the underlying
hardware and software. ISO is the organization. OSI is the model.

16. Match the following to one or more layers of the OSI model:

 Route determination: Network Layer


 Flow control: Data Link Layer and Transport Layer
 Interface to transmission media: Physical Layer
 Provides access for the end user: Application Layer

17. Match the following to one or more layers of the OSI model:

 Reliable process-to-process message delivery


 Route selection
 Defines frames
 Provides user services such as e-mail and file transfer.
 Transmission of bit stream across physical medium

18. Match the following to one or more layers of the OSl model:

 Communicates directly with user's application program


 Error correction and retransmission
 Mechanical, electrical, and functional interface
 Responsibility for carrying frames between adjacent nodes.

19. Match the following to one or more layers of the OSI model:

 Format and code conversion services


 Establishes, manages, and terminates sessions
 Ensures reliable transmission of data
 Log-in and log-out procedures
 Provides independence from differences in data representation

20. In Figure 2.22, computer A sends a message to computer D via LAN1,


router Rl, and LAN2. Show the contents of the packets and frames at the
network and data link layer for each hop interface.

21. In Figure 2.22, assume that the communication is between a process


running at computer A with port address i and a process running at
computer D with port address j. Show the contents of packets and frames
at the network, data link, and transport layer for each hop.
22. Suppose a computer sends a frame to another computer on a bus
topology LAN. The physical destination address of the frame is corrupted
during the transmission. What happens to the frame? How can the sender
be informed about the situation?

 If the corrupted destination address does not match any station address
in the network, the packet is lost. If the corrupted destination address
matches one of the stations, the frame is delivered to the wrong station.
In this case, however, the error detection mechanism, available in data
link protocols, will find the error and discard the frame.

23. Suppose a computer sends a packet at the network layer to another


computer somewhere in the Internet. The logical destination address of
the packet is corrupted. What happens to the packet? How can the source
computer be informed of the situation?

 The packet will go through error checking to let the node search for
corruption on a higher probability before using the destination address in
an intermediate or destination node and discarding the packet. Typically,
the protocol at the upper layer notifies the source computer to send the
packet again.
24. Suppose a computer sends a packet at the transport layer to another
computer somewhere in the Internet. There is no process with the
destination port address running at the destination computer. What will
happen?

 In this scenario, most protocols generate a special error message that is


returned to the sender.

25. If the data link layer can detect errors between hops, why do you think we
need another checking mechanism at the transport layer?

 The errors between the nodes can be detected by the data link layer
control, but the error at the node (between input port and output port) of
the node cannot be detected by the data link layer.

 The data link layer has the ability to detect errors between hops, but not
end-toend errors. Whereas the transport layer is in charge of ensuring
reliable end-toend data delivery, the data link layer manages data
transmission between two devices that are directly connected.

You might also like