You are on page 1of 2

Imagine that you have just created a new protocol for Internet data transfer, BURP, the Bidirectional

User Retransmission Protocol. You want it to become a required protocol for Internet traffic. What’s the
process for getting a new protocol accepted? Be sure to describe the different organizations involved
and the different states the protocol specifications will go through.

From figure 1-3 in the class e-book, make sure you understand the concept that application layer
protocols ride atop transport layer protocols (which ride atop Internetwork layer protocols).There are
two transport layer protocols, TCP and UDP. List which of the two transport layer protocols the following
application layer protocols use:

Smtp- TCP

Snmp- UDP

telnet-TCP

ftp-TCP

dhcp-UDP

dns-UDP

http-TCP

Are any local colleges or universities members of Internet2? Which one(s)?

Yes, Northern Kentucky University, University of Kentucky, University of Louisville.

Describe at least 3 of the differences between the TCP/IP model and the OSI model. Why might
someone prefer to discuss and learn the TCP/IP model instead of OSI? Be specific about why the TCP/IP
model might be preferred when teaching/learning networking. Why is it better than the OSI model? Or,
is it?

One difference is that the OSI model guarantees the delivery of packets whereas the TCP/IP model does
not guarantee delivery of packets, even though TCP/IP is still more reliable. The second difference is that
the OSI model has a separate Session Layer and Presentation Layer whereas the TCP/IP model does not
have either one. The third difference is that the OSI model has 7 layers that include the application,
presentation, session, transport, network, data link, then physical layer; TCP/IP only has 4 which are
application, transport, internet, and network access layer.
The TCP/IP is better than the OSI model for teaching and learning for many reasons. There are a lot of
drawbacks when it comes to the OSI model. The OSI model provides data integrity which is not needed
or required for most applications. The OSI model is very complex. The OSI model is not adapted at all to
telecommunication applications on computer. The TCP/IP model is better because it serves more
compatibility between many types of computers. It also is separate from the operating system.

Do a search in the RFC database. Find information on the “Evil Bit”.

Which RFC describes the evil bit? RFC 3514

What category is the RFC? Informational

Who wrote it and when? Steve Bellovin in April 2003

What should systems do in the case of the evil bit being 0? The packet has no evil intent and systems
should assume that it is harmless.

What if the evil bit is 1? The packet has a evil intent and systems should try to defend themselves
against the packets.

You might also like