Professional Documents
Culture Documents
(Supplementary materials)
ANSWER.
Layered Protocol Architecture is a combination of subtasks arranged in layers,
each performing specific function. The bottom layer consists of protocols
related to hardware services and to complete the exchange of information, more
layers are added above it.
ADVANTAGES:
i. It divides the complex task of network communication into
subtasks, thus facilitating the maintenance, flexibility and
scalability of the system.
ii. The layers are implemented and managed separately; therefore
functionality of the individual layers can be extended and
technology of different layers does not interfere with each other.
iii. The requirement of the new service or protocol in the system can
be easily fulfilled by introducing it in the required layer, without
disturbing the whole system.
iv. Designing the protocol aiming at specific function of the system
can be easily designed when the system is governed by layered
protocols as it provides clear distinction between different layers
and the functions of the system.
2. What is the OSI 7 layer reference model? List the seven layers.
ANSWER
The Open System Interconnection (OSI) Model consists of 7 layers that
illustrate the functions of a networking System. These 7 abstraction layers
collaborate to implement the transmission of information between two users or
hosts.
It was published in 1984 by International Organization for Standardization
(ISO).
Today, it acts as conceptual reference model that aids in understanding the
network architecture, provides a standard for communication between
computers and helps in troubleshooting networking problems.
The 7 layers of the OSI Model are:
LAYER 7 Application
Layer
LAYER 6 Presentation
Layer
LAYER 5 Session Layer
LAYER 4 Transport Layer
LAYER 3 Network Layer
LAYER 2 Data Link Layer
LAYER 1 Physical Layer
Application Layer, Presentation Layer and Session layer are the software layers.
Network Layer, Data Link layer and Physical Layers are hardware layers.
Transport layer is called the Heart of OSI.
3. What are the layers of TCP/IP protocols? Describe the basic functions of
each layer.
ANSWER
TCP/IP model consists of 5 layers on which the Internet protocol suite is based.
These layers consist of independent protocols that govern the transmission of
data across the network.
The 5 main layers of the TCP/IP Model are:
Application Layer
Transport Layer
Internet Layer
Network Access
Layer
Physical Layer
The brief descriptions of the layers are as follows:
1. Physical Layer: This layer is responsible for transmitting the bit stream over
a physical medium. The physical interface is between the device that
transmits data and the network medium. It basically transmits and receives
bits. It also monitors data rate and the nature of the signals.
2. Network Access Layer: This layer governs transmission of data between two
users/devices on the same network. It encapsulates the IP datagram into
frames. Physical layer and Network Access layer combine to form Network
Interface layer.
3. Internet Layer: This layer takes care of the data packets till they reach the
destination. It deploys Internet Protocol (IP). Routing functions in this layer
aid in traversing of data over multiple interconnected networks. Also termed
as network layer, it illustrates the logical transmission of data over network.
4. Transport Layer: Transmission Control Protocol is used in this layer. It
ensures the delivery of the message to its destination. In addition to this it
also performs error control. It performs segmentation by dividing the
message into sequence of packets.
5. Application Layer: This layer allows the interaction between the user and the
software application. Email services, Logging onto remote host, these are the
functions of the Application Layer.
ANSWER
According to (http://www.ietf.org/rfc/rfc791.txt [page 23] we have following
scheme:
Higher Order Class
Bits
0 A
10 B
110 C
CLASS A:
In class A, the first bit is always set to 0 in the first octet. We get:
00000000 – 01111111
0– 127
We get range of IP Address:
0.x.x.x – 126.x.x.x
CLASS B:
In class B, the first two bits are set to 10 in the first octet. We get:
10000000 – 10111111
128 – 191
We get range of IP Adress:
128.0.x.x – 191.255.x.x
CLASS C:
The first three bits of first octet of Class C are set to 110. We get:
11000000 – 11011111
192-223
We get address range:
192.0.0.x – 223.255.255.x
ANSWER:
Zero Compression: If the address contains adjacent sequence of 16-bit blocks
with “Zero” value, zero compression allows these zeros to be compresses to “::”
“::” can be used only once in the address.
ANSWER:
CIDR stands for Classless Inter-Domain Routing. It is scheme of IP addressing
that enhances the allocation of IP addresses. The old system of Classes A,B, is
replaced by CIDR. It reduces the wastage of IP addresses. It works on
Variable-length subnet masking. The network address is followed by number of
bits in the address.
Subnet 2
223.1.117.128/26
223.1.117.10000000/26 =
223.1.117.128 to 223.1.117.191
64
Subnet 3 =
223.1.117.192/26
223.1.117.11000000/26
223.1.117.192 to 223.1.117.255
64
ANSWER:
MAC addresses are Medium Access Control Addresses. These addresses are
hard coded in network adaptors. They are also referred to as Hardware
addresses or Physical Addresses. It is basically a unique identification number
of device on the network.
8. What is the purpose of ARP protocol? Please state how it works briefly.
ANSWER:
ARP stands for Address Resolution Protocol. It is part of IP routing and is used
to retrieve MAC Address of the Device from its IP Address. It basically
maintains a cache(Temporary Memory) to map MAC address to IP Addresses.
When a device wants to communicate with another device on LAN, then this
protocol is used.
Working:
ARP Cache is present in all the operating systems in an IPv4 Ethernet Network.
When MAC address is requested by host to transmit the packet to another host,
it goes through its ARP cache. If IP to MAC address translation does not exists
then network address is requested and if match is found then MAC address is
responded.
Request Packet is broadcasted to all the devices on the LAN by the ARP, when
the required device is found, ARP cache is updated.
ANSWER:
Domain Name System Protocol allows the users on the internet to recognize
and find the websites on the network using human readable hostnames, instead
of complex IP Addresses. It is an application layer protocol.
IP addresses are difficult to memorize therefore domain names are used. This
mapping of Domain name and IP addresses is done by the DNS protocol.
Whenever Domain name is requested by the user, the DNS server finds the
corresponding IP address and fulfills the request.
DNS plays central role in distributes Internet Services, it allows convenient
access of the data on the network as the user can use simple URL and domain
name of the URL would fetch the required page with the aid of the DNS.
10.What are the two types of IP address allocation? What are their pros and
cons?
ANSWER:
The two types of IP address allocation are Static IP address allocation and
Dynamic IP address Allocation.
Static IP addresses are input manually and they do not change.
Dynamic IP Addresses are variable and can be changed.
Pros and Cons:
Static IP Address Dynamic IP Address
Pros 1. Devices using Static 1. Dynamic IP Addresses
IP address can host are economical than
servers as they can Static IP Addresses.
be located easily 2. Since they do not require
from all across the manual input, they need
globe. less level of
2. It remains same maintenance.
irrespective of the 3. Due to dynamic nature
reboot status of the they tend to be more
device. secure.
3. They provide
stability for internet
use as they never
change.
4. The upload and
download speed is
also high for Static
IPs
11.What are IP, TCP, and UDP stands for? Which layer are they working on,
respectively? What kind of service does each of them provide? Why do
HTTP, FTP, SMTP run on top of TCP rather than on UDP?
ANSWER
Protocol Full Form Layer Service
IP Internet Protocol Internet/Network Addressing,
Layer Fragmentation.
TCP Transmission Transport Layer Process to
Control Protocol Process
Communication,
Full Duplex
Service,
Connection
Oriented
Services,
Reliable
Delivery of
Packets
UDP User Datagram Transport Layer Trivial File
Protocol transfer Protocol,
Real Time
streaming
Protocol
HTTP, FTP, SMTP run on top of TCP rather than on UDP because of reliable
data transfer facilitated by TCP which UDP does not provide. As TCP is
connection Oriented Protocol, it ensures the delivery of packets while such
delivery is not ensured by UDP.
12.List three of the commonly used application layer protocols that use
TCP/IP services and explain their functions. Indicate the default ports used
by these application protocols. You may refer to the Internet standard
webpage.
http://www.rfc-editor.org/rfc.htmland Internet Assigned Numbers
Authority (IANA) website: http://www.iana.org/assignments/service-
names-port-numbers
ANSWER:
Three commonly used Application Layer protocols using TCP/IP services are:
1. HTTP - Hyper text Transfer Protocol. This application Layer protocol is
used to establish connection with web servers on the internet. It uses
hypertext links to load web pages.
Default Port is TCP 80.
2. SMTP – Simple Mail Transfer Protocol is part of TCP/IP. It uses “Store and
forward” Process to transfer email across the network.
Default Port Number is 25.
3. SNMP – Simple Network Management Protocol. It is used to configure
remote devices, to keep check on the network and detect network faults.
Default Port number is TCP 161.