Professional Documents
Culture Documents
Reference Models and Network Devices - Express Learning - Data Communications and Computer Networks
Reference Models and Network Devices - Express Learning - Data Communications and Computer Networks
PREV NEXT
⏮ ⏭
Unit I - Introduction Unit II - Physical Layer
🔎
Ans: The main aim behind building a layered architecture is to reduce the
design complexity of a computer network. Other advantages of layering in
a computer network are as follows:
Find answers on the fly, or master something new. Subscribe today. See pricing
options.
Layering can resolve complicated tasks by breaking it
into smaller and manageable pieces.
Ans: When data is sent from one machine to another, it travels down
sequentially from layer to layer on the source machine and as it reaches
the destination machine, it moves up through the layers. While the data
passes through layers on source machine, each layer adds header (and
sometimes, trailer which is usually added at data link layer) to it and
passes the whole unit to the layer directly below it. The header attached at
each layer contains control information such as sequence numbers and
size of data.
Figure 2.2 shows the data flow in OSI model during communication
between two processes on machines A and B. Initially, the application
layer (layer 7) of machine A adds an application header (AH) to the data
and passes the package to the presentation layer (layer 6), which further
adds its own header PH to the received data and passes it to the session
layer. The same process is repeated at the session (layer 5), transport
(layer 4) and network layers (layer 3). At the data link layer (layer 2), a
trailer DT is also added to the data received from network layer along with
the header DH. Finally, the entire package (data plus headers and trailer)
reaches the physical layer where it is transformed into a form
(electromagnetic signals) that can be transmitted to the machine B.
Ans: The seven layers of OSI model are divided into two groups
according to their functionalities. Physical, data link and network layers
are put in one group, as all these layers help to move data between
devices. Transport, session, presentation and application layers are kept
in other group, because they allow interoperability among different
software. The functions of each layer are discussed as follows:
Ans: Each layer contains some active elements called entities, such as
process. Entities are named as peer entities when they are in the same
layer on different systems. Between two adjacent layers is an interface
which defines the operations and services of the lower layer that are
available to its immediate upper layer. A well-defined interface in a
layered network helps to minimize the amount of traffic passed between
layers. The set of operations provided by a layer to the layer above it is
called service. The service is not concerned about the implementations
of operations but defines what operations the layer can perform for its
users. Thus, lower layer implements services that can be used by its
immediate upper layer with the help of an interface. The lower layer is
called a service provider and the upper layer is called a service user.
A layer can request for the services of the lower layer, which is present
below it, through a specific location known as service access point
(SAP). SAP has a unique address associated with it. For example, in a fax
machine system, SAP is the socket in which a fax machine can be plugged
and SAP addresses are the fax numbers which are unique for every user.
Therefore, to send a fax, the destination SAP address (fax number) must
be known (Figure 2.3).
The presentation layer is concerned with the syntax and semantics of the
information being transmitted between communicating devices. Other
functions of presentation layer are as follows:
Ans: Both network and transport layers are responsible for end-to-end
communication but still there are certain differences in the set of services
they provide. These differences are listed in Table 2.1.
Find answers on the fly, or master something new. Subscribe today. See pricing
in case the datagram does not reach its destination.
IGMP is used to deliver the same message to a
options.
number of recipients at the same time.
3. Transport Layer: The main function of this layer
is to deliver a message from a process on the source
machine to a process on the destination machine.
This layer is designed to allow end-to-end
conversation between peer entities. It uses three
protocols, namely, TCP, user datagram protocol
(UDP) and stream control message protocol
(SCMP) to accomplish its responsibilities. TCP is a
connection-oriented protocol which means a
connection must be established between the source
and the destination before any transmission begins.
It is also a reliable protocol, as it ensures error-free
delivery of data to the destination. UDP is an
unreliable and a connectionless protocol that
performs very limited error checking. SCTP is the
combination of UDP and TCP and it supports
advanced features such as voice over the Internet.
Ans: Each layer in the TCP/IP model uses an address for the efficient
delivery of data between communicating nodes. The host-to-network
layer (physical plus data link layer) relates to physical address, network
layer relates to logical address, transport layer concerns with port
address and application layer defines specific address. The description of
these addresses is as follows:
Ans: OSI and TCP/IP are layered models that allow the computer
systems to communicate with each other. The OSI reference model was
developed by ISO in order to standardize the protocols being used in
various layers and the TCP/IP model was developed by DoD to connect
multiple networks. Both models have some similarities which are as
follows:
The differences between OSI and TCP/IP models are listed in Table 2.2.
options.
• It clearly distinguishes • It does not clearly
services, interfaces and distinguish services,
protocols. interfaces and
protocols.
14. Explain where the following fit in the OSI reference model.
Ans: (a) The actual 4-kHz analog signal exists only in the physical layer
of the OSI reference model.
Ans: Novell Netware is the popular network system which was designed
for replacing mainframes with a network of PCs thereby reducing the cost
of companies. In this network, each user is assigned a desktop PC
operating as client that uses services (database, file etc) provided by
some powerful PCs operating as servers. Novell network is the
modification of old Xerox network system (XNS) and it uses a protocol
stack (see Figure 2.5). It was developed prior to OSI and looks like TCP/IP
model.
The physical and data link layers of Novell Netware network can use any
standard protocols including Ethernet, IBM token ring and ARCnet. The
network layer uses Internet packet exchange (IPX) protocol, which is an
Find answers on theunreliable
fly, or andmaster something
connectionless new.IPXSubscribe
inter-network protocol. transmits today. See pricing
packets from the source to destination transparently regardless of
options.
whether the source and destination are on the same or on the different
networks. It provides the same functionality as that of IP. However, the
only difference between the two is that IPX uses 12-byte address while IP
uses 4-byte address. The transport layer uses network core protocol
(NCP) which is a connection-oriented protocol. It provides many services
in addition to transporting data. Another protocol which works on
transport layer is sequenced packet exchange (SPX) that provides only
data transport service. The application can choose from a variety of
protocols such as SAP and file server.
Repeater
Hub
Nowadays, the terms repeater and hub are used synonymously, but
actually they are not same. Although at its very basic level, a hub can be
thought of as a multi-port repeater. Typically, hubs have anywhere from 4
to over 400 ports. When a signal is received on one port of the hub, it is
regenerated out to all the other ports. It is most commonly used to
connect multiple machines to the same LAN. Administrators connect a
computer to each port on the hub, leaving one port free to connect to
another hub or to a higher-level device such as a bridge or router.
Bridge
This device allows the division of a large network into two or more smaller
and efficient networks. It monitors the information traffic on both sides of
the network, so that it can pass packets of information to the correct
location. Most bridges can ‘listen’ to the network and automatically figure
out the address of each computer on both sides of the bridge. A bridge
examines each packet as it enters though one of the ports. It first looks at
the MAC address of the sender and creates a mapping between the port
and the sender's MAC address. It then looks at the address of the
recipient, comparing the MAC address to the list of all learned MAC
addresses. If the address is in the list, the bridge looks up the port number
and forwards the packet to the port where it thinks the recipient is
connected. If the recipient's MAC address is not in the list, the bridge then
does a flood; it sends the signal to all the ports except the one from where
it was received. As a result, a bridge reduces the amount of traffic on a
LAN by dividing it into two segments. It inspects incoming traffic and
decides whether to forward or discard it (Figure 2.8).
options.
a packet through a bridge. On a modern bridge, this overhead is miniscule
and does not affect network performance.
Switch
Router
Gateway
Transparent Bridge
This bridge is used to connect two or more token ring LANs. In addition
to the source and destination address, each frame includes the address of
the all the bridges to be visited as specified by the source station. Thus,
Find answers on thethefly, ora frame
path of master something
is already new.
defined by the source stationSubscribe
and today. See pricing
intermediate nodes cannot take any decision on the routes. The source
station acquires the addressesoptions.
of bridges by exchanging some special
frames with the destination station before the transmission of data frame
begins. Figure 2.12 shows a source routing bridge.
Remote Bridge
Ans: Some differences among bridge, router and repeater are listed in
Table 2.3.
• It • It operates at • It operates at
operates the network the physical
at the layer of OSI layer of OSI
data link model. model.
layer of
OSI
model.
• It is • It is mostly • It is used to
mostly used in extend the
used in internetworking. physical length
LANs. of a network.
Ans: The differences between switch and hub are listed in Table 2.4.
Switch Hub
Ans: Some of differences between the router and switch are listed in
Table 2.5.
Router Switch
Find answers on the fly, or master something new. Subscribe today. See pricing
• It uses IP address foroptions.
• It uses MAC address
transmission of packets. for transmission of
frames.
3. IP is responsible for__________communication
while TCP is resposible
for__________communication.
(a) process-to-process, host-to-host
(b) host-to-host, process-to-process
(c) process-to-process, node-to-node
(d) node-to-node, host-to-host
Find answers on the fly, or master something new. Subscribe today. See pricing
5. To interconnect two homogeneous WANs, we need
a__________. options.
(a) bridge
(b) gateway
(c) router
(d) hub
Answers
1. (b)
2. (c)
3. (b)
4. (d)
5. (c)
6. (b)
7. (b)
Find answers on the fly, or master something new. Subscribe today. See pricing
options.