You are on page 1of 4

Question 1: What is the architecture of the protocol?

Answer: Layered structure of hardware and software that supports the exchange of data between
systems as well as a distributed application e.g., email or file transfer.
• Each protocol provides a set of rules.
Tasks of communications are broken up into modules
— Each module (or layer) can have its own protocol
In very general terms, communications can be said to involve three components: applications,
computers, and networks.
• For example, file transfer could use three modules (or layers)
— File transfer application
— Communications service module
— Network access module
• The stack of protocols is called “Protocol Stack”
— Or Protocol Architecture
Key Elements of a Protocol
• Syntax
– Creates a data block format understood by all
• Semantics
– Control information for coordinating and error handling
• Timing
– Synchronizes timing for functions such as speed matching and sequencing.

Protocol Architectures and Networks


Simplified Network Architecture

TCP/IP Protocol Architecture


• Developed by the US Defense Advanced Research Project Agency (DARPA) for its
packet switched network (ARPANET)
• Used by the global Internet
• No official model but a working one.
– Application layer
– Host to host or transport layer
– Internet layer
– Network access layer
– Physical layer
Physical Layer
• Physical interface between data transmission device (e.g. computer) and transmission medium or
network
• Characteristics of transmission medium
• Signal levels
• Data rates
Network Access Layer
• Exchange of data between end system and network
• Destination address provision
• Invoking services like priority
Internet Layer (IP)
• Systems may be attached to different networks
• Provides Routing functions across multiple networks
• Implemented not only in end systems but also routers.
• Routers‐primary function is to relay data from one n/w to other.
Transport Layer (TCP)
• Reliable delivery of data
• Ordering of delivery
Application Layer
• Contains logic needed to support for user applications.
• e.g. http, SMPT

Question 2 : Explain the UDP Header.


Answer: UDP header is 8-bytes fixed and simple header, while for TCP it may vary from 20 bytes to
60 bytes. First 8 Bytes contains all necessary header information and remaining part consist of data.
UDP port number fields are each 16 bits long, therefore range for port numbers defined from 0 to
65535; port number 0 is reserved. Port numbers help to distinguish different user requests or
process.

1. Source Port : Source Port is 2 Byte long field used to identify port number of source.
2. Destination Port : It is 2 Byte long field, used to identify the port of destined packet.
3. Length : Length is the length of UDP including header and the data. It is 16-bits field.
4. Checksum : Checksum is 2 Bytes long field. It is the 16-bit one’s complement of the one’s
complement sum of the UDP header, pseudo header of information from the IP header and
the data, padded with zero octets at the end (if necessary) to make a multiple of two octets.

You might also like