a. the physical layer, b. and the data-link layer. a. three physical layers, b. three data-link layers, c. and only one network layer.

Similar documents
NT1210 Introduction to Networking. Unit 10

Chapter 7 Transport Layer. 7.0 Introduction 7.1 Transport Layer Protocols 7.2 TCP and UDP 7.3 Summary

TCP/IP protocol suite

CSCD 330 Network Programming

Chapter 2 Network Models 2.1

Computer Communication & Networks / Data Communication & Computer Networks Week # 03

Connectionless and Connection-Oriented Protocols OSI Layer 4 Common feature: Multiplexing Using. The Transmission Control Protocol (TCP)

infrared Disadvantage: 1. cannot use for long-range communication or outside a building due to sun s rays.

ECE 4400:427/527 - Computer Networks Spring 2017

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

System Programming. Introduction to computer networks

Lecture (11) OSI layer 4 protocols TCP/UDP protocols

Network Reference Models

CSEN 503 Introduction to Communication Networks. Mervat AbuElkheir Hana Medhat Ayman Dayf. ** Slides are attributed to J. F.

Chapter 2 Communicating Over the Network

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER

CMPE 80N: Introduction to Networking and the Internet

Review of Important Networking Concepts

B.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems

Communicating over the Network

OSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

BABU MADHAV INSTITUTE OF INFORMATION TECHNOLOGY, UTU 2017

Introduction to Networks

CS3600 SYSTEMS AND NETWORKS

Chapter 11. User Datagram Protocol (UDP)

Transport Layer. Gursharan Singh Tatla. Upendra Sharma. 1

Unit 2.

Position of IP and other network-layer protocols in TCP/IP protocol suite

TSIN02 - Internetworking

Network Models. Behrouz A. Forouzan Data communication and Networking Fourth edition

Configure Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) Service Settings on a Switch

CSCE 463/612 Networks and Distributed Processing Spring 2018

TCP/IP THE TCP/IP ARCHITECTURE

E&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang

Network Architecture Models

OSI Transport Layer. objectives

ECE 333: Introduction to Communication Networks Fall 2002

L6: OSI Reference Model

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

Transport Layer Overview

TRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016

ECE 333: Introduction to Communication Networks Fall 2001

CPS221 Lecture: Layered Network Architecture

ECE4110 Internetwork Programming. Introduction and Overview

(Refer Slide Time: 1:09)

Application. Transport. Network. Link. Physical

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE

4. The transport layer

Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1

COMP750. Distributed Systems. Network Overview

Introduction to TCP/IP networking

Chapter 3 Protocols and the TCP/IP Suite

CCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1

Networking Basics. EC512 Spring /15/2015 EC512 - Prof. Thomas Skinner 1

b) Diverse forms of physical connection - all sorts of wired connections, wireless connections, fiber optics, etc.

TCP/IP Networking Basics

Development of reliable protocol Sliding window protocols. C = channel capacity in bps I = interrupt/service time + propagation delay

Review of Important Networking Concepts TCP/IP

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

TCP/IP Overview. Basic Networking Concepts. 09/14/11 Basic TCP/IP Networking 1

Chapter 2. Communicating Over The Network. CCNA1-1 Chapter 2

Tutorial 2 : Networking

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

Peer entities. Protocol Layering. Protocols. Example

Operating Systems CS 571

Transport Layer. <protocol, local-addr,local-port,foreign-addr,foreign-port> ϒ Client uses ephemeral ports /10 Joseph Cordina 2005

Business Data Networks and Security 10th Edition by Panko Test Bank

Lecture-4. TCP/IP-Overview:

CSE 123A Computer Networks

Faculty of Science and IT Course title. Pre-requisite/corequisite

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START

Defining Networks with the OSI Model. Module 2

CSCD 330 Network Programming

Data and Computer Communications

TCP/IP stack is the family of protocols that rule the current internet. While other protocols are also used in computer networks, TCP/IP is by far

Introduction to computer networking

PROGRAMMING Kyriacou E. Frederick University Cyprus. Network communication examples

Chapter 1 Introduction

Packet Switching, Layer Models and Protocol Suites

CCNA 1: Chapter 2 Exam Answer v %

b. Suppose the two packets are to be forwarded to two different output ports. Is it

TSIN02 - Internetworking

Networking and Health Information Exchange: ISO Open System Interconnection (OSI)

Lesson 5 TCP/IP suite, TCP and UDP Protocols. Chapter-4 L05: "Internet of Things ", Raj Kamal, Publs.: McGraw-Hill Education

Chapter 7. Local Area Network Communications Protocols

The Data Link Layer. 32 PART I Networking Basics

CCNA Exploration Network Fundamentals. Chapter 3 Application Layer Functionality and Protocols

Announcements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6

TCP /IP Fundamentals Mr. Cantu

Network Review TEJ4M. SBrace

NAT, IPv6, & UDP CS640, Announcements Assignment #3 released

No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6

CS 640: Introduction to Computer Networks. Today s Lecture. Page 1

Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 1. Slide 2. Slide 3

ACL Rule Configuration on the WAP371

IS370 Data Communications and Computer Networks. Chapter 5 : Transport Layer

Transport Protocols. Internet has broadly two types of transport protocols as shown in figure below:

Interconnecting Networks with TCP/IP

Transcription:

CHAPTER PRACTICE SET Questions Q-. Q-. To make the communication bidirectional, each layer needs to be able to provide two opposite tasks, one in each direction. The link-layer switch is normally involved in the first two layers of the TCP/ IP protocol suite: a. the physical layer, b. and the data-link layer. Q-. The router is involved in: a. three physical layers, b. three data-link layers, c. and only one network layer. Q-4. The identical objects are the two messages: one sent and one received. Q-5. a. At the application layer, the unit of data is a message. b. At the network layer, the unit of data is a datagram. c. At the data-link layer, the unit of data is a frame. Q-6. Q-7. Q-8. A frame is a link-layer data unit. It encapsulates a data unit coming from the network layer. In this case, the data unit is a datagram. A user datagram is a transport-layer data unit. It decapsulates a data unit going to the application layer. In this case, the data unit is a message. The data unit should belong to layer 4. In this case, it is a user datagram.

Q-9. We mentioned HTTP, FTP, SMTP, SNMP, TELNET, SSH, and DNS. Q-0. The transport-layer packet needs to include two port numbers: source and destination port numbers. The transport-layer header needs to be at least bits (four bytes) long, but we will see in Chapter 4 that the header size is normally much longer because we need to include other pieces of information. Q-. a. At the application layer, we normally use a name to define the destinationcomputer name and the name of the file we need to access. An example is something@somewhere.com. b. At the network layer, we use two logical addresses (source and destination) to define the source and destination computers. These addresses are unique universally. c. At the data-link layer, we use two link-layer addresses (source and destination) to define the source and destination connections to the link. Q-. The answer is no. Multiplexing/demultiplexing at the transport layer does not mean combining several upper-layer packets (from the same or different applications) into one transport-layer packet. It only means that each of the transport-layer protocols (such as TCP or UDP) can carry a packet from any application-layer protocol that needs its service. However, a transport-layer packet can carry one, and only one, packet from an application-layer protocol. For example, UDP can carry a message from FTP in one user datagram and a message from HTTP in another user datagram. Q-. The application layer is the top layer in the suite; it does not provide services to any layer, which means multiplexing/demultiplexing does not exist for this layer. Q-4. We do not need a link-layer switch because the communication in this case is automatically one-to-one. A link-layer switch is needed when we need to change a one-to-many communication to a one-to-one. Q-5. We do not need a router in this case because a router is needed when there is more than one path between the two hosts; the router is responsible for choosing the best path at each moment. Problems P-. The services provided in part a and part b are the opposite of each other.

a. Layer takes the ciphertext from layer, inserts (encapsulates) it in an envelope and sends it. b. Layer receives the mail, removes (decapsulates) the ciphertext from the envelope and delivers it to layer. P-. The services provided in part a and part b are the opposite of each other. a. Layer takes the plaintext from layer, encrypts it, and delivers it to layer. b. Layer takes the ciphertext from layer, decrypts it, and delivers it to layer. P-. In 0 years, the number of hosts becomes about six times (.0 0 6.9) the number in 00. This means the number of hosts connected to the Internet is more than three billion. P-4. The system transmits 50 bytes for a 00-byte message. The efficiency is 00/ 50 or 66.66%. P-5. The advantage of using large packets is less overhead. When using large packets, the number of packets to be sent for a huge file becomes small. Since we are adding three headers to each packet, we are sending fewer extra bytes than in the case in which the number of packets is large. The disadvantage manifests itself when a packet is lost or corrupted during the transmission; we need to resend a large amount of data. P-6. a. The network layer is responsible for route determination. b. The physical layer is the only layer that is connected to the transmission media. c. The application layer provides services for the end users. P-7. a. User datagrams are created at the transport layer. b. The data-link layer is responsible for handling frames between adjacent nodes. c. The physical layer is responsible for transforming bits to electromagnetic signals. P-8. There should be an upper-layer identifier in the header of the IP protocol to define to which upper-layer protocol the encapsulated packet belongs. The identifier is called the protocol field (See Figure 9. in Chapter 9).

4 P-9. The following shows the situation. If we think about multiplexing as many-toone and demultiplexing as one-to-many, we have demultiplexing at the source node and multiplexing at the destination node in the data-link layer. However, some purists call these two inverse multiplexing and inverse demultiplexing. FTP HTTP DNS SNMP FTP HTTP DNS SNMP Multiplexing TCP UDP TCP UDP Demultiplexing Demultiplexing IP IP Multiplexing L L L L L L a. At the source node b. At the destination node P-0. Every time any packet at any layer is encapsulated inside another packet at the same layer, we can think of this as a new layer being added under that layer. The following shows the new suite. Security Link Security Link P-. The following shows the layers. Note that we have not shown the security checking that you need to pass through because it does not have the counterpart when you arrive. It must be included in baggage/checking layer. Source/destination airport Baggage checking/claiming Boarding/unboarding Takeoff/Landing Source/destination airport Baggage checking/claiming Boarding/unboarding Takeoff/Landing Flying

5 P-. The following shows the position of the presentation layer. The new layer is at the same position as the presentation layer in the OSI model if we ignore the session layer. Presentation Data link New layer Presentation Data link P-. P-4. P-5. The only two layers that need to be changed are the data-link layer and the physical layer. The new hardware and software need to be installed in all host, routers, and link-layer switches. As long as the new data-link layer can encapsulate and decapsulate datagrams from the network layer, there is no need to change any protocol in the upper three layers. This is one of the characteristics of the protocol layering. The reason for having several protocols in a layer is to provide different services to the upper-layer protocols. The services provided by UDP are different from the services provided by TCP. When we write an application program, we need to first define which transport-layer protocol is supposed to give services to this application program. Note that this does not violate the principle of layer independence. The independency of a layer means that we can change a protocol in a layer as long as the new one gives the same services as the old one. This does not mean that we can replace UDP by TCP, because they provide different services. The following shows the layers and the flow of data. Note that each host is involved in five layers, each switch in two layers, and each router in three layers. West coast office East coast office R Point-to-point WAN R 5 4 5 4 Host Switch Switch Host