You are on page 1of 24

PLEASE WRITE YOUR SUBJECT CODE

PLEASE WRITE THE SUBJECT NAME

SEPTEMBER 2021

Assignment 1

Student
Photo :

Name Ziyan Nifail Noraina Suria Partiban A/L Seertinban Tharani A/P
: Amiera Tharmalingam A/L Gopalakrishna
Norazman Vijayendran n

Matrix No 01202109081 0120210905 01202109070 01202109084 012021091248


: 0 1 1

Program
: DIT DIT DIT DCF DIT

Submission 12/10/2021 12/10/2021 12/10/2021 12/10/2021 12/10/2021


date :
Mark TAS
s K1

TAS
K2
CHAPTER:
Chapter 1 – Introduction: Computer networking
Chapter 2 – TCP/IP and OSI Model

WEIGHTAGE: 20%
Group of three students – 100 marks
INSTRUCTION:
1. Report MUST contain minimum 10 pages.
2. Submission in word file format to Eklas.
a. Date of Submission and presentation: 12 October 2021
b. Each student need to print presentation rubric. (Individual)
c. Each group need to print only on report rubric. (Group)

Task1:

1. Open System Interconnection (OSI) model is the standardization for the data
movement among all nodes in a network. Explain OSI model?

2. What is the TCP/ IP model?.

3. Explain the differences between physical and logical addresses.

4. Explain the two types of services: Connection oriented and connectionless and give a
protocol for each type.

(60 marks)
Task 1

1. Open System Interconnection (OSI) model is the standardization for


the data movement among all nodes in a network. Explain OSI
model?

Open System Interconnection (OSI) is a benchmark that specifies how


information from one computer's software application moves through a
physical media to another computer's software application The OSI model
was developed in 1984 by the International Organization for
Standardization (ISO) and is currently considered an architectural
demonstration for communication between computers. The OSI model was
created with the intention of providing a set of design guidelines enabling
equipment makers to communicate with one another. The OSI model
specifies a hierarchical architecture that logically divides the functions
required for system-to-system communication. Then, the OSI model was
established to standardise data networking protocols so that all networking
devices on the earth could communicate with one another. Then, in order
to assist network administrators, huge data exchange processes were
divided into smaller portions. Understanding, managing, and
troubleshooting smaller segments is easier. Furthermore, the OSI model
was developed to provide a common platform for software developers and
hardware manufacturers to encourage the development of networking
products that can communicate with one another over the network.

In addition, the OSI model has many advantages. The OSI Model can help
network managers figure out what hardware and software they'll need to
develop their network. It also encourages hardware makers to develop
networking products that can interact with one another through the internet.
The OSI Model is a teaching tool for understanding how networking
components communicate with one another. Furthermore, it decomposes a
complicated function into simpler components. Finally, the OSI Model
simplifies troubleshooting since network administrators may troubleshoot
issues faster and more efficiently by focusing on the layer that is causing
the problem rather than searching the entire network. Finally, the OSI
model makes troubleshooting easier because network administrators can
solve problems faster and more efficiently by looking at a layer that is
causing the problem rather than finding it across the network.

Furthermore, the OSI Model has a number of drawbacks. It defines a


variety of services several times. For an example, the error control service
is defined in both Transport and Data Link layers. Then it prevents layers
from working in parallel. A layer must wait for data from the previous layer
before proceeding. Furthermore, instead of defining similar functions in the
same layer, it defines them in different layers that add additional
complexity. Finally, rather than offering a summary of infrequently used
protocols and functions, it describes each protocol and function in great
detail, making the model long and less effective for administrators.

There are seven layers in the OSI Model. Each layer is responsible for a
specific network function The OSI model divides the procedure into seven
more manageable steps. Each layer is given a certain task. Each layer is
self-contained, enabling for the completion of each layer's activities
independently.

Diagram 1: OSI Model

There are two layers to the OSI model. Such as, upper layers and lower layers.

 The OSI model's upper layer mostly works with application-related difficulties,
which are exclusively implemented in software. The application layer is the
one with the most contact with the end user. The application layer is the one
with the most contact with the end user. The layer just above another is
referred to as an upper layer.
 The OSI model's lowest layer deals with data transmission difficulties. Then,
hardware and software are used to construct the data link and physical layers.
Hardware and software are used to construct the data link and physical layers.
The physical layer is primarily in charge of transferring data to the physical
medium.
Diagram 2: Upper Layers and Lower Layers of OSI Model

7 layers of the OSI Model

There are seven layers in the OSI model. Each layer has a distinct purpose. The
following is a list of seven layers:

1. Physical Layer
2. Data-Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
1. Physical Layer

The main job of the physical layer is to transport individual bits from one node to
another. It is the bottom layer of the OSI model. The physical link is also established,
maintained and deactivated as a result. Then the specifications of the mechanical,
electrical and procedural network interface are specified. Line configuration is one of
the functions of a physical layer. It specifies how two or more devices can be
physically connected. Then there is the data transmission. It specifies the
transmission mode between two network devices as simplex, half-duplex or full-
duplex. In addition, the topology specifies how network devices are connected.
Finally, the type of signal used to send information is determined by the signals

Diagram 3: PHYSICAL LAYER OF OSI REFERENCE MODEL

2. Data- Link Layer

Data Link Layer is responsible for ensuring that data frames are transferred
without error. It specifies the format of data on the network. It allows two or
more devices to communicate reliably and efficiently. In particular, it is
responsible for the specific identity of each device that resides on a local
network.

This layer is split into two parts.

 Logical Link Control (LLC)


The network layer protocol is identified by this sub-layer. The Network
Layer protocol information is encapsulated in the LLC header on the
transmitting computer, from which the Data Link layer receives the data
packet. The LLC header is checked by the receiving computer to obtain
information about the network layer protocol. A data packet is always
delivered to the same network layer protocol it was sent from in this
manner.
 Media Access Control (MAC)
This subclass defines how data packets are placed in the media. It
also provides a physical address. The MAC address is the same as the
physical address. Unlike logical addresses that must be configured,
physical addresses are preconfigured in the network card. The MAC
address is used to uniquely identify a host in the local network.

DIAGRAM 4: DATA-LINK LAYER OF OSI REFERENCE MODEL

3. Network Layer
The Network Layer takes up the third layer of the OSI model. This layer adds a
logical address to the data segment that was created by the Transport layer.
Network partition and host partition are the two components of a logical
address. The network partition is used to group networking components,
whereas the host partition is utilized to uniquely identify a network system. The
IP address is the logical address of a computer. The segment becomes the
packet after the logical address and other associated information are included.
This layer determines if the packet is for a local or remote system. It also sets
the standards and methods for moving data packets across networks. An IP
address is a type of logical address. The segment becomes the packet once
the logical address and other relevant information are added to it. This layer
determines if the packet is intended for a local or remote system. It also lays
out the standards and techniques for transporting data packets across
networks. A router is used to transport data packets between two separate
networks. The logical address is used by routers to make routing decisions.
Routing is the process of moving data packets from one location to another.
Network layer protocols are the protocols that are used to route network traffic.
IP and IPv6 are two examples of protocols.
DIAGRAM 5: NETWORK LAYER OF OSI REFERENCE MODEL

4. Transport Layer

The transport layer is the OSI model's fourth layer and It comes with a lot of
features. The segmentation is one of the example. The data stream is broken
up into smaller parts on the sending computer. The process of splitting the
data stream into smaller parts is known as segmentation, and each piece is
known as a segment. It connects all segments on the receiving computer to
reconstitute the original data stream. Then there's the data delivery. This layer
creates a logical link between the sending and receiving systems and then
leverages that link to enable end-to-end data transfer. There are two protocols
involved in this procedure TCP and UDP are two examples. For secure data
transmission, the TCP protocol is utilised. Transmission Control Protocol
(TCP) is a connection-oriented protocol. In addition, for unstable data
transmission, the UDP protocol is employed. UDP is a protocol that does not
require a connection. Furthermore, the key distinction between a connection-
less and a connection-oriented protocol is that the latter ensures dependable
data delivery. The three-way handshake protocol, acknowledgments,
sequencing, and flow management are all used to ensure dependable data
delivery. Finally, with the usage of port numbers, this layer offers connection
multiplexing. Multiple apps can send and receive data at the same time thanks
to connection multiplexing.
DIAGRAM 6: TRANSPORT LAYER OF OSI REFERENCE MODEL

5. Session Layer

It is the OSI model's fifth layer. The Session layer is responsible for
establishing, maintaining, and synchronising communication between devices.
The Session Layer only has a few functionalities. Such as, the dialogue
control. The session layer is a dialogue controller that produces a dialogue
between two processes, or more precisely, it facilitates communication
between two processes that can be half-duplex or full-duplex. After that,
there's the synchronisation. When transmitting data in a sequence, the
Session layer adds some checkpoints. If a data transmission fault happens in
the middle of the process, the transmission will be restarted from the
checkpoint.

DIAGRAM 7: SESSION LAYER OF OSI REFERENCE MODEL

6. Presentation Layer
The Presentation layer is the sixth layer of the OSI model. Local applications may or
may not understand the format used to send data across the network. The
presentation layer performs the role of a translator. It translates data received from
the Application layer into a format that can be delivered over the network. When it
receives data from the Session layer, it re-formats it so that the application that will
use it can comprehend it. Information is sent between two systems in the form of
character strings, integers, and other data. The presentation layer manages
interoperability between various encoding methods used by different computers. It
translates data from a sender-dependent format to a common format and then back
to a sender-dependent format at the receiving end. To guarantee privacy, encryption
is required. Encryption is the process of transforming information sent by the sender
into a different format and sending the resulting message through the network.
Finally, data compression is the practise of reducing the amount of data that is
stored. Furthermore, data compression is critical in multimedia, such as text, audio,
and video.

Diagram 8: PRESENTATION LAYER OF OSI REFERENCE MODEL


7. Application Layer
This is the last and highest layer of the OSI model. This layer gives an interface
between the nearby framework and the application program running on the
organization. Assuming an application needs to utilize the assets accessible on the
distant framework, it interfaces with this layer. Then, at that point, this layer gives the
conventions and administrations that the application needs to get to those assets.
Then, at that point, there are two sorts of use programs. For example, Network-
aware and Network-unaware. An application program is viewed as a Network-aware
application in the event that it can make any sort of organization demand. On the off
chance that an application program can't make any sort of organization demand, it is
viewed as a Network-unaware program.

Furthermore, network-aware programmes are classified into two categories.


 Programs designed primarily for use on a local system.This type of
programme connects to the network on occasion for specific purposes
such as updates, documentation, and troubleshooting. This sort of
programme includes Microsoft Word, Adobe Photoshop, and VLC
Player.
 Programs designed specifically for use with a remote system. This type
of application gives you a way to get access to resources on a remote
computer. This type of programme can only function if the computer is
linked to the Internet. Examples of this type of application include SSH,
FTP, and TFTP.

Diagram 9: APPLICATION LAYER OF OSI REFERENCE MODEL


2. What is TCP/IP model?TCP/IP model is a four-layered suite of communication
protocols. TCP stands for Transmission Control Protocol and IP stands for Internet
Protocol.TCP/IP is also used as a communications protocol in a private computer
network.In 1960’s it was developed by the DoD (Department of Defence). TCP/IP
requires little central management and is designed to make networks reliable with the
capacity to recuperate automatically from the failure of any device on the network.
TCP defines how applications can constract channels of communication across a
network. IP defines the way to to form sure it gets to the proper destination. Each
gateway computer on the network checks this IP address to work out where to send
the message.

How does TCP/IP works? TCP/IP uses the client-server model of communication
during which a user is provided a service, like sending a webpage, by another
computer within the network example a server .TCP/IP suite of protocols is assessed
as stateless, which suggests each client request is taken into account new because
it's different to previous requests. Being stateless frees up network ways in order that
they are often used constantly.The OSI reference model defines how applications
can communicate over a network. The TCP/IP show differs slightly from the seven-
layer Open Frameworks Interconnection (OSI) organizing show outlined after it. The
OSI reference support characterizes how applications can communicate over a
organize. TCP/IP are often utilized to provide inaccessible login over the organize, for
intuitively record exchange, to supply mail, to supply webpages over the arrange and
to remotely get to a server host's record framework. Most broadly, it's utilized to talk
to how informationchanges form because it voyages over a arrange, from the
concrete physical layer to the unique application layer. It details the basic protocols,
or methods of communication at each layer as information pass through.

How to see the diffrents between TCP and IP model.TCP can control the size and
flow rate of data. It ensures that networks are free of any press that could block the
receipt of data. With TCP, only a single request to send an entire data stream.TCP
handles the rest. Unlike IP, TCP can detect problems that arise in IP and request
recommit of any data packets that were lost.TCP can also reorganize packets so they
get transmitted in the proper order IP is limited by the amount of data that it can
send. The biggest size of a single IP data packet, which contains both the header
and the data, is between 20 and 24 bytes long. This means that longer strings of data
must be separate into multiple data packets that must be independently sent and
then reorganized into the correct arrangement after they are sent.
In contrast to IP, TCP/IP is a higher-level smart communications protocol that can do
a lot more. TCP/IP still uses IP as a the transporting data packets, but it also
connects computers, applications, webpages and web servers. TCP understands
holistically the whole streams of data that these assets require in order to operate,
and it makes sure the entire volume of data needed is sent the first time. TCP also
runs checks to make sure the data is delivered.

Usual protocol of TCP/IP model are HTTP (Hyper Text Transfer Protocol) handles
the communication between a web server and a web browser.FTP (File Transfer
Protocol) handles transmission of files between computers and HTTPS (Secure
HTTP) handles secure communication between a web server and a web browser.
There are few pros and cons for TCP/IP model:

The benefits for using TCP/IP model are

o helps establish a connection between different types of computers


o has client-server architecture that is highly scalable
o can be used independently
o works independently of the operating system
o supports many routing protocols example supports several routing protocols
and is lightweight and doesn't place unnecessary strain on a network or
computer
o is lightweight and doesn't place unnecessary strain on a network or computer.

The drawbacks for using TCP/IP model are:

o transport layer doesn't guarantee delivery of packets


o not easy to replace protocols in TCP/IP;
o complicated to set up and manage example doesn't clearly separate the
concepts of services, interfaces and protocols, so not good for describing new
technologies in new networks
o does not clearly separate the concepts of services, interfaces and protocols,
so it is not suitable for describing new technologies in new networks

The Diffrence between TCP/IP model and OSI

TCP/IP model OSI

Uses only layer to define functionalities Uses three layers to define


of the upper layers(application) functionalities upper layers
(application,presentation,session)

Header size is 20 bytes Header size is 5bytes

Protocol oriented standard Generic model based on the


functionalities of each layer

Follows horizontol approach Follows vertical approach

Helps establish a connection between helps standardize routers, switches,


diffrent types of computers motherboards and other hardware

Consistant 4 architectural layers of 7 larchitecture layer


Application Represents data to the user and
encoding and dialog control

Supports communication
Transport between diverse devices across
diverse networks

Determines the path through


Internet the network

Controls the hardware devices


Network access and media the makeup to the
network

Layers 1 : Application Layer

application layer is a layer that specifies the collaborative communications protocols


and interface methods used by hosts in a communications network. The application
layers in TCP/IP model are the functions of OSI application layer,presentation layer
and Session layer.Any process above the the transport layer is called an application
in the TCP/IP architecture. This layer includes all high-level protocols like Telnet,
DNS, HTTP, FTP, SMTP, etc

Layers 2 : Transport Layer

The two most important protocols in the Transport Layer are Transmission Control
Protocol (TCP) and User Datagram Protocol (UDP). TCP provides reliable data
delivery service with end-to-end error detection and correction. UDP provides low-
overhead, connectionless datagram delivery service. Both protocols deliver data
between the Application Layer and the Internet Layer. Applications programmers can
choose whichever service is more appropriate for their specific applications.

Layers 3 : Internet Layers

The internet protocol (IP) is the primary protocol in the TCP/IP model Network
layers. All layers need to go through IP as they are passed through the TCP/IP
protocol stack. It defines the protocols for logical transmission of data over the
network. The main protocol in this layer is IP and it is supported by the protocols
ICMP, IGMP, RARP, and AR.
Layers 4 : Network Layers

It is the lowest layer that is concerned with the physical transmission of data. TCP/IP
does not specifically define any protocol here but supports all the standard
protocols.TCP/IP makes use of existing Data Link and Physical Layer standards
rather than defining its own.
3. Explain the differences between physical and logical addresses.

Definition of Logical Address

When a programme is running, the CPU generates a logical address. The logical
address is virtual since it does not exist physically. As a result, it's often referred to as
a Virtual Address. This address serves as a reference to the actual memory location.
The collection of all logical addresses generated by a program's perspective is
referred to as Logical Address Space. The Memory-Management Unit is a hardware
component that converts logical addresses to physical addresses. During build and
load time, MMU's address-binding algorithms generate identical logical and physical
addresses. At runtime, however, the address-binding algorithms provide a variety of
logical and physical addresses. When a programme runs, the Central Processing
Unit creates a logical address, which is also referred to as a physical address
because it does not exist physically but only virtually. This virtual address can be
used to access the central processing unit's physical memory location, and the set of
all the logical addresses generated by the central processing unit is known as logical
address space, with the mapping of these logical addresses to physical addresses
performed by a hardware device known as memory management unit.

Functions of Logical Address

Every company may have a number of networks. A single website may be associated
with many VLANs, each of which is connected to a different network. Alternatively,
depending on the requirements, there may be many websites, each of which is
connected to a distinct network or networks. There will be hosts connected to the
networks, and each of these hosts will be associated with a NIC, with physical
addresses known as MAC addresses burned into the NICs. The second layer's
physical addresses are used to transfer data frames from one host to another on the
same network. The third tier is made up of logical addresses allocated to it via DHCP.
The hosts of one network will communicate with the hosts of other networks using
third layer addresses. When a host on one network tries to connect with a host on
another, it looks for the target host's third layer address and compares it to its own. If
the hosts' addresses are found to be on the same network, the host will try to find the
target network's second layer address and send the data frame straight to the target
host's second layer. The gateway locates a route destination host on a different
network using a third layer address, and the packet is routed through this gateway to
the target network. The physical addresses of data frames are lost when they are
transmitted across different networks. Physical addresses are stored in frame
headers, while logical addresses are used to extract the physical address from the
header and erase it, allowing logical addresses to send data frames to the
destination network.

Declaration of Logical Addresses Using Different Methods

Over the internet, computers interact with one another. Data transmitted from one
computer must traverse several local area networks (LAN) and wide area networks
(WAN) before reaching the destination computer. For such communications to take
place between computers, we need a global addressing scheme, often known as
logical addressing or logical address. The internet protocol (IP) address is used to
refer to logical addresses in any TCP or IP layer network. Internet addresses are 32
bits long. As a result, there are only two raise to the power of 32 addresses, which
are known as internet protocol version 4 (IPv4) addresses.

An IPv4 address is a unique and universal way to define a device's internet


connection. Due to its uniqueness, each IPv4 address identifies just one machine's
connection to the internet. There can never be more than one IPv4 address for two
computers connecting to the internet at the same time. It is presumed that a device
connected to the internet through n connections has n logical addresses. IPv4
addresses are universal because all hosts trying to connect to the internet, also
known as global addressing, must recognise this specific addressing scheme.

Definition of Physical Address

The physical address designates a memory location. The physical address for each
logical address is determined by the MMU (Memory-Management Unit). In order to
compute physical addresses, MMU uses logical addresses as well. The physical
address is never displayed to the user. Instead, the user accesses the physical
address through its logical equivalent. The user programme generates the logical
address and assumes that this is where the application is running. The programme,
on the other hand, requires physical memory to run. As a result, the logical address
must be mapped to the physical address before they can be used. Memory-
Management Unit is used  to convert a logical address to a physical address,
hardware is employed. The collection of all physical addresses that correspond to the
logical addresses in a logical address space is referred to as the Physical Address
Space. In computer networks, the MAC address (acronym for Media Access Control)
is used to identify devices. It's a 48-bit identifier made up of six hexadecimal blocks
that identifies a network card or device uniquely. It's also known as a physical
address. It's unique to each device in use. The OUI is used by both the IEEE (last 24
bits) and the manufacturer (first 24 bits) to determine and configure it.

What is Physical Address or MAC Address

The MAC address is a physical address since it physically identifies a piece of


hardware (also known as a hardware address). The only variation is the size of the
identifier. MAC addresses employ three distinct number systems, all of which use the
same format. It's possible that the addresses are "Universally Managed" or "Locally
Managed." Only a manufacturer may provide a device a "Universally Managed"
physical address, often known as "burned-in addresses." Routers, network repeaters,
Wi-Fi extenders, printers, smartphones, tablets, laptops, NAS or network storage,
and other similar devices are all examples of network devices. Any device with a
network card that allows it to connect through Wi-Fi or Ethernet is given a MAC
address. This MAC address would work in the same way as a device's fingerprint
does. The MAC addresses of the devices are defined and managed by the Institute
of Electrical and Electronic Engineering (IEEE), an independent organisation
responsible for generating certifications of Wi-Fi standards and network connection.

The first three octets (in transmission order) identify the company that issued the
identity and are referred to as an organisational unique identifier (OUI). In
accordance with the notion of uniqueness, this organisation assigns the three (MAC-
48 and EUI-48) or five (EUI-64) octets below at its discretion. According to the IEEE,
the MAC-48 space will be finished before 2100, and the EUI-64 space will not be
depleted anytime soon. Because this code has been agreed upon by each device
maker, we can determine, as if it were a fingerprint, from which network device the
data packet was transmitted even if the IP address changes.

Why we need a Physical Address

A network device's MAC address is used to identify it. This might be used to
automate the process of validating network connections. MAC address filtering,
which limits the connection of unregistered devices and prevents them from stealing
your home Wi-Fi, is one of the most common applications of the MAC address.
Enable your router's MAC address filtering features and input the MAC addresses of
your PCs, mobile devices, and tablets to achieve this.

MMU (Memory-Management Unit) operation


Comparison Table

PARAMETER Logical Addresses Physical Addresses

It's the virtual address that A physical address is a


Basic
the CPU generates. memory unit's location.
The Logical Address Physical Address refers to
Space is the collection of the collection of all
Address Space all logical addresses physical addresses that
created by the CPU in have been mapped to their
relation to a programme. logical counterparts.
The logical address of a The user will never be able
Visibility programme can be viewed to see the program's
by the user. physical address.

To go to the physical The user is unable to


Access location, the user utilises reach a physical address
the logical address. directly.

The CPU generates the MMU determines your


Generation
logical address. physical address.

4. Connection Oriented Service and Connectionless Service

Data communication is a type of telecommunication network that is capable of


sending and receiving data from one computer to another either from a same or
different network. Before sending data from one device to another, there are two
ways to establish a connection between them. One of the ways to establish a
connection is by using a connection-oriented service. The connection for sending the
data between two or more devices is created and terminated by the connection
oriented service. Connection-oriented service is used at the session layer to transport
and send data.
After the telephone system, the connection-oriented service was design and
developed as a network service. Before the data is transmitted over the same or
different network, an end to end connection between the sender and the receiver is
created by the connection-oriented service. In the connection-oriented service,
transmission of packets to the receiver are sent the same order as the sender.
Connection between user and sender for transmitting data over the network is
created by a handshake method, this is also known as a reliable network service. A
few types of connection oriented service, is a reliable message stream, for example a
sequence of pages, reliable byte stream which is song downloads and unreliable
connection which is VoIP (Voice Over Internet Protocol).
The connection-oriented service has three phases, which are the connection
setup phase, data transfer phase and connection teardown phase. During the
connection setup phase, data that is transported or sent requires the establishment
of a session connection. Besides that, in the data transfer phase, data and message
is sent after a connection is established at the first phase. Lastly, the connection
teardown phase involves the release of the connection between the connected
device.
The connection-oriented service is carried out in two ways which are through
circuit-switch connection and virtual circuit-switched connection. The circuit-switched
connection a dedicated physical path or a circuit between the communicating nodes
is set up, while data in the virtual circuit-switched connection, is sent over a packet
switched network. This allows a virtual path to be established but other connection
can also use this path.
The advantages of connection-oriented service include the improvement of
quality of service, the increase of reliability of connection oriented service, division of
long messages to smaller messages and the duplication of data problems are lesser.
Moreover, the disadvantages of the connection-oriented service are the fixed cost
even if there are traffic changes, the necessity of resource allocation before
communication and no availability of continuation in communication if route or path
fails or network congestion occurs.
TCP (Transmission Control Protocol) is a protocol for the connection-
oriented service which enables the establishment of connection in a same or different
network for two or more computers. Organization of data to be sent from server to
client is done by the TCP. TCP sets up a connection between the source and the
destination before the transmission of data occurs. TCP ensures the data integrity
throughout the process when large amount of data break to smaller packets.
Examples of TCP Protocol are the (File Transfer Protocol) FTP, Telnet and SMTP
(Simple Mail Transfer Protocol).

The second way to establish a connection is by using a connectionless


service. Data that is sent by the sender is not checked if the receiver manage to
receive the data is a connectionless service. Due to the fact that the data is not
guaranteed to be received by the receiver and the data can be received at any order,
this connectionless service is an unreliable network service. The data packets also
do not follow the same path and is routed independently. Datagrams are usually
called or data packets in a connectionless service. Besides that, the amount of traffic
that will be sent by the user is not specified by the network, therefore the network has
no knowledge about it.
A few examples of connectionless services are a datagram with
acknowledgement such as text message with delivery report and also request-reply
such as queries from remote databases.
Furthermore, the advantages of the connectionless service are the amount of
overheads are usually low, the capability of broadcasting or multicasting messages to
multiple recipients, the time taken to establish a connection is very fast and it also
has an alternative path of data transmission if there are cases of router failures or
network congestion. The disadvantages of connectionless service are the
vulnerability of congestion in the network is really high, cases of duplication, wrong
delivery of packets and loss of data packets are high as well and each data packet
requires a large amount of field to contain destination addresses and routing
information.
An example of connectionless protocol is the UDP (User Datagram Protocol)
which is used to provide low-latency and loss-tolerating connection between
applications in the internet. Before an agreement is established by the receiving
party, data is allowed to be transferred by the UDP therefore, the UDP speeds up
transmission. The UDP does not involve in the handshaking of two devices therefore,
data is not guaranteed to be sent to the right destination. A few applications of UDP
are lossless data transmission such as Real Time Streaming Protocol (RSTP) and
Simple Network Management Protocol (SNMP), gaming, voice and video
communications and DNS servers.
REPORT ASSESSMENT RUBRICS

Category Proficient Good Acceptable Unacceptable Mark


(9-10) (6-8) (3-5) (1-2)
Hypotheses Hypotheses are clearly Hypotheses are Makes some No predictions
stated with specific stated with specific predictions, but about results.
directional predictions. directional non-direction
predictions, but or unclear.
unclear.
Technical All information, All Information Most Much
Methods measures and variables provided that is information information
Includes are provided and sufficient to repeat correct, but missing and/or
explained. the study, but more some inaccurate.
explanation is information
needed (e.g., may be missing
explanation of the or inaccurate.
choice of measures).
Discussion Demonstrates thorough Hypotheses are Some Conclusions
and sophisticated clearly stated, but hypotheses don’t match
understanding. All some concluding missing or hypotheses,
hypotheses included; statements not misstated; not supported
conclusions drawn are supported by data or conclusions not by data; no
appropriate for data not well supported by integration of
analyses; data from well integrated. data. data from
integrated. different
sources.
General Title page, placement of Minor errors in Major errors No style in
formatting figures and figure formatting. and/or missing text.
captions, and other information.
formatting issues all
correct.
Writing & Writing is strong and Writing is clear and Most of the Very unclear,
organization easy to understand; easy to understand; required many errors.
ideas are fully ideas are connected; criteria are
elaborated and effective transitions met, but some
connected; effective between sentences; lack of clarity,
transitions between minor typographic, typographic,
sentences; no spelling, or spelling, or
typographic, spelling, or grammatical errors. grammatical
grammatical errors. errors are
present.

References Following APA Some of them APA A few of them Not followed
reference style reference style

Total /60
Task 2
During class time, in a group of 4-5 Students, prepare a short presentation (3-5 Min) on
Asynchronous Transfer Mode (ATM) protocol architecture.

Student Name: Matric Number:


No. Category 0-2 3-5 6-8 9-10 Mar
k
Content Not all questions Answers weren’t Good answers but it Technical terms are
were answered. enough to cover all lack to a good well-defined in
1. the questions. formatting and appropriate
English grammar. language and
formatting.

Comprehen Presenter didn’t Student showed Student showed a Extensive


understand topic. good good understanding knowledge of topic.
2. sion Majority of questions understanding of of topic. Accurately
answered some parts of topic. Answered all
incorrectly. questions posed.
Organizatio Writing lacks logical Writing is coherent Writing is coherent Writing shows high
organization. It and and degree of attention
n shows some logically organized. logically organized to logic and
coherence but ideas Some with reasoning of points.
lack points remain transitions used Unity
3 unity. Serious errors. misplaced and between clearly leads the
stray from the topic. ideas and reader to the
paragraphs to create conclusion and stirs
coherence. thought.

Body Disinterested body Body language was Some fidgeting by Appropriate body
4. language. distracting. speaker. language
language
Total
/40

You might also like