CHAPTER 2 NETWORK MODELS 47 Another model that defines protocol layering is the Open Systems Interconnection...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
CHAPTER 2 NETWORK MODELS 47 Another model that defines protocol layering is the Open Systems Interconnection (OSI) model. Two layers in the OSI model, session and presentation, are missing from the TCP/IP protocol suite. These two layers were not added to the TCP/IP protocol suite after the publication of the OSI model. The application layer in the suite is usually considered to be the combination of three layers in the OSI model. The OSI model did not replace the TCP/IP protocol suite because it was completed when TCPAP was fully in place and because some layers in the OSI model were never fully defined. 2.5 PRACTICE SET 2.5.1 Quizzes A set of interactive quizzes for this chapter can be found on the book website, It is strongly recommended that the student take the quizzes to check his/her understanding of the materials before continuing with the practice set. 2.5.2 Questions What is the first principle we discussed in this chapter for protocol layering that needs to be followed to make the communication bidirectional? Q2-1. Which layers of the TCP/IP protocol suite are involved in a link-layer switch? A router connects three links (networks). How many of each of the following layers can the router be involved with? Q2-2. Q2-3. a. physical layer b. data-link layer c. network layer Q2-4. In the TCP/IP protocol suite, what are the identical objects at the sender and the receiver sites when we think about the logical connection at the application layer? A host communicates with another host using the TCP/IP protocol suite. What is the unit of data sent or received at each of the following layers? b. network layer Q2-5. a. application layer e. data-link layer Which of the following data units is encapsulated in a frame? b. a datagram Q2-6. a. a user datagram c. a segment Which of the following data units is decapsulated from a user datagram? b. a segment Q2-7. a. a datagram c. a message Q2-8. Which of the following data units has an application-layer message plus the header from layer 4? a. a frame b. a user datagram c. a bit Q2-9. List some application-layer protocols mentioned in this chapter. Q2-10. If a port number is 16 bits (2 bytes), what is the minimum header size at the transport layer of the TCP/IP protocol suite? Q2-11. What are the types of addresses (identifiers) used in each of the following layers? b. network layer a. application layer e. data-link layer CHAPTER 2 NETWORK MODELS 47 Another model that defines protocol layering is the Open Systems Interconnection (OSI) model. Two layers in the OSI model, session and presentation, are missing from the TCP/IP protocol suite. These two layers were not added to the TCP/IP protocol suite after the publication of the OSI model. The application layer in the suite is usually considered to be the combination of three layers in the OSI model. The OSI model did not replace the TCP/IP protocol suite because it was completed when TCPAP was fully in place and because some layers in the OSI model were never fully defined. 2.5 PRACTICE SET 2.5.1 Quizzes A set of interactive quizzes for this chapter can be found on the book website, It is strongly recommended that the student take the quizzes to check his/her understanding of the materials before continuing with the practice set. 2.5.2 Questions What is the first principle we discussed in this chapter for protocol layering that needs to be followed to make the communication bidirectional? Q2-1. Which layers of the TCP/IP protocol suite are involved in a link-layer switch? A router connects three links (networks). How many of each of the following layers can the router be involved with? Q2-2. Q2-3. a. physical layer b. data-link layer c. network layer Q2-4. In the TCP/IP protocol suite, what are the identical objects at the sender and the receiver sites when we think about the logical connection at the application layer? A host communicates with another host using the TCP/IP protocol suite. What is the unit of data sent or received at each of the following layers? b. network layer Q2-5. a. application layer e. data-link layer Which of the following data units is encapsulated in a frame? b. a datagram Q2-6. a. a user datagram c. a segment Which of the following data units is decapsulated from a user datagram? b. a segment Q2-7. a. a datagram c. a message Q2-8. Which of the following data units has an application-layer message plus the header from layer 4? a. a frame b. a user datagram c. a bit Q2-9. List some application-layer protocols mentioned in this chapter. Q2-10. If a port number is 16 bits (2 bytes), what is the minimum header size at the transport layer of the TCP/IP protocol suite? Q2-11. What are the types of addresses (identifiers) used in each of the following layers? b. network layer a. application layer e. data-link layer
Expert Answer:
Answer rating: 100% (QA)
Solutiou2 a data liuk layer are invelved u a linh layer kwitch 23 The nouter im... View the full answer
Related Book For
Posted Date:
Students also viewed these mechanical engineering questions
-
What are the seven layers of the Open Systems Interconnection (OSI) model?
-
Use either Stokes' theorem or the divergence theorem to evaluate each of the following integrals in the easiest possible way. 15. fydx + zdy + xdz, where C is the curve of intersection of the...
-
What is the first principle we discussed in this chapter for protocol layering that needs to be followed to make the communication bidirectional?
-
Problem 9- 3A Estimating and reporting bad debts P2 At December 31, 2013, Hawke Company reports the following results for its calendar year. Cash sales . . . . . . . . . . $ 1,905,000 Credit sales ....
-
Why are there no capital assets in governmental- type funds?
-
Meyer reported the following pretax financial income (loss) for the years 20062010. 2006 .....$240,000 2007 .......350,000 2008 .......120,000 2009 ......(570,000) 2010 .......180,000 Pretax...
-
Repeat Example 14-2 except for a single-stage system and unknown underflow product concentration. Example 14-2 We wish to treat 1000.0 kg/h (wet basis) of insoluble meal (D) that contains 20.0 wt%...
-
Trost Leasing Company buys equipment for leasing to various manufacturing companies. On October 1, 2010, Trost leases a press to Shumway Shoe Company. The cost of the machine to Trost was $196,110,...
-
Question: Execute hypothetical facts that would apply to Federal Rules of Civil Procedure Rule 33along with a legal problem/issue that would apply to Federal Rules of Civil Procedure Rule 33 .The key...
-
Calculate bias currents and the low-frequency small-signal voltage gain for the CMOS op amp of Fig. 6.58. Use the parameters given in Table 2.4, and assume that X d =0.1 μm and dX d /dV...
-
cements ants 0 Question 27 If a pedestrian is injured by an object falling from a building, the owner is likely to be held liable under the doctrine of OA. comparative negligence OB. family purpose 1...
-
Discuss how a Cross-Site Scripting (XSS) works? Discuss defense in depth and defense in breadth, how are they implemented?
-
What strategies does the operating system employ for efficient I/O device management, including techniques for scheduling and prioritizing tasks, buffering data, and handling interrupts to maximize...
-
Maganda Corporation uses Material A which is applied at the start of the process, while material B is added to the good units. Inspection is at 90% completion. Normal spoilage is 5% of good output....
-
Your firm sells $6,000 worth of goods in December, $4,700 worth in January, $5,100 in February, and $5,800 in March. Your cost is 65% of your selling price. You have a receivables period of 30 days...
-
What are 2 pros and 2 cons ofactivity-basedcosting? Can you give me examples of situations where activity-basedcosting could be used effectively and why?
-
5. Issue the command nmap -O followed by the IP address of the target. You may be prompted to enter the root password. A method to avoid being prompted for the root password on all privileged...
-
Listed below are several terms and phrases associated with basic assumptions, broad accounting principles, and constraints. Pair each item from List A (by letter) with the item from List B that is...
-
What are three advantages of telecommuting?
-
What are two capabilities of Google's Home as an intelligent assistant?
-
1. How does Pandora Radio recommend music to its listeners? 2. How are listeners able to create their own customized stations? 3. What are some variables that Pandora Radio uses to recommend a song?
-
Fashion Fabrics sells sewing and craft materials to specialty retail and department stores. For the year, the company's New York Division had the following performance targets: Actual information...
-
Assume that management at Subway has decided to implement a balanced scorecard for the organization. Visit the company's site map at http://www.subway.com/subway root/sitemap.aspx. Using the...
-
Go to http://www.carbonfootprint.com/calculator.aspx to compute your approximate carbon footprint. What goals and measurements would you put on a balanced scorecard to reduce the size of that...
Study smarter with the SolutionInn App