country
$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

G424 Network Computing 2

tag 0 Download9 Pages 2,004 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT
  • Course Code: G424
  • University: Brunel University London
  • Country: United Kingdom

Questions:

  1. List the layers of the OSI model and the TCP/IP protocol suite (the Internet Model)
  2. How do the layers of the OSI correlate to the layers of the TCP/IP protocol suite?
  3. Which layers of the TCP/IP protocol suite are the network support layers and which layers are the user support layers?
  4. What is data encapsulation (with respect to Questions 1-3)?
  5. What are the responsibilities of the Data Link layer?
  6. What is the difference between Network layer and Transport layer delivery?
  7. If the Data link layer can detect errors between hops, why do you think we need another mechanism at the Transport layer?
  8. What are the responsibilities of the Network layer?
  9. What are the responsibilities of the Transport layer?
  10. What is the difference between a port address, a logical address and a physical address?
  11. Name some services provided by the Application layer
  12. What are the advantages of combining Session, Presentation and Application layers of the OSI model to a single layer in the TCP/IP protocol suite?
  13. 13.What is an advantage of a hierarchical name space over a flat name space for  a system the size of the Internet?
  14.  What is the difference between a primary and a secondary DNS?
  15. Why do we need POP3 or IMAP for electronic mail?
  16. What is the purpose of FTP?
  17. What anonymous FTP?
  18. How is HTTP related to WWW?
  19. What is a URL and what are its components?
  20. What is a proxy server and how is it related to HTTP?
  21. What does HTML stand for and what is its function?
  22. What are the SNMP components?
  23. List the SNMP v1 and v2 message types and their function
  24. Can two devices connected to the same Frame Relay network use the same DLCIs?
  25. Compare an SVC with a PVC
  26. How is an ATM virtual connection identified?
  27. Why is SONET called a synchronous network?
 

Answers:

1. List the layers of the OSI model and the TCP/IP protocol suite (the Internet Model)

Following are the list of OSI model and TCP/IP model:

OSI layers

Layer 7: The application layer. ...

Layer 6: The presentation layer. ...

Layer 5: The session layer. ...

Layer 4: The transport layer. ...

Layer 3: The network layer. ...

Layer 2: The data-link layer. ...

Layer 1: The physical layer

TCP/IP model layers

Application layer

The transport layer

The network layer

The data-link layer

2. How do the layers of the OSI correlate to the layers of the TCP/IP protocol suite?

The TCP/IP protocol suit contains four layers including host-to-network, internet, transport, and application. In case of OSI model, host-to-network layer is merged with combination of the physical and data link layers. The internet layer is merged with network layer, and application layer is merged with session, presentation, and application layers with transport layer in TCP/IP.

 


3. Which layers of the TCP/IP protocol suite are the network support layers and which layers are the user support layers?

Network support layers are data link layer and network layer. User support layer is application layer.

4. What is data encapsulation (with respect to Questions 1-3)?

Data encapsulation focuses on sending data in which data can be segmented within successive layers of control for transmission across network. Data Encapsulation deals with sending and receiving of data from source. The data encapsulated with protocol information at each OSI reference layer model. Therefore, each layer communicates with it beside layer on the destination. The network device sends a message then it takes a form of data packet. This data packet is added with a header that contains some information regarding destination. Therefore, the data packet is encapsulated under this header file and send to the destination. This also helps in providing security to the data and information stored in the data packet. 

5. What are the responsibilities of the Data Link layer?

Following are the list of responsibilities of data link layer:

  • logical linkcontrol
  • media access control
  • hardware addressing
  • error detection
  • handling of data

6. What is the difference between Network layer and Transport layer delivery?

The main difference is related to the delivery of packets from source to destination across multiple networks. Transport layer has been responsible for the source to destination delivery of all message.

7. If the Data link layer can detect errors between hops, why do you think we need another mechanism at the Transport layer?

Transport layer helps in becoming a bridge between applications executing in several hosts. Therefore, error detection is required in data link layer.

 


8. What are the responsibilities of the Network layer?

Following are list of responsibilities of network layer:

  • Permitting several networks to be interconnected.
  • Forwarding packets to network routers
  • Error handling

9. What are the responsibilities of the Transport layer?

Following are list of responsibilities of transport layer:

  • Respond to service request form session layer
  • Deliver messages between hosts
  • Create an end to end connection between source IP and destination IP

10. What is the difference between a port address, a logical address and a physical address?

Logical address is generated by CPU with respect to program. A physical address is an address in a network card. Computer components are addressed by port address.

11. Name some services provided by the Application layer

Following are the services provided by application layer:

  • File services, such as the NFS service.
  • Simple Network Management Protocol (SNMP), which enables network management.
  • File transfer,
  • Remote access,
  • Shared database management
  • Mail services.

12. What are the advantages of combining Session, Presentation and Application layers of the OSI model to a single layer in the TCP/IP protocol suite?

The OSI model consists of seven layers and TCIP/IP has been consisting of five layers. The combination of session, presentation and application layer in TCP/IP helps in reducing complexity of the layers of model. It also helps in increasing the speed of data transfer in the model. It also helps in providing a well-mannered structure to the TCP/IP model.

 


13. What is an advantage of a hierarchical name space over a flat name space for a system the size of the Internet?

Searching a name in hierarchical structure has been faster that searching in a linear system in case of large name space. The binary search can be used in the hierarchical name space and sequential search is used in the linear name space. Hierarchical name space are flexible and less complex as compared to the flat name space. Therefore, searching can be fast in the hierarchical name space.

14. What is the difference between a primary and a secondary DNS?

DNS refers to the Domain Name System which is the largest database in the world. It contains all registration data and domain name. There are two types of DNS server including primary and secondary DNS. A primary DNS server has been responsible in order to reading data related to domain zone. This server is also responsible for creating a communication bridge with secondary server. Therefore, when request is issued to a server, it starts travelling through primary DNS server and then allocate to secondary server.

The secondary DNS server has been responsible for the slave server that is responsible for obtaining data from server. Secondary DNS server does not obtain data form the primary DNS server.

15. Why do we need POP3 or IMAP for electronic mail?

IMAP refers to Internet Message Access Protocol. POP refers to Post Office Protocol. Both of these protocols help in reading emails from local access using a third party application. POP helps in downloading emails from the server for permanent storage in local devices. However, IMAP leaves on them on the server and caches the memory in the local storage. Therefore, IMAP helps in implementing cloud computing in the email reading process.

16. What is the purpose of FTP?

File transfer protocol is used for transferring files between computers connected in a network. FTP ca be used for transferring files between an account and commuter and accessing online software module. FTP helps in providing keen approach in downloading the data and files from the server.  The access it the files and documents over the server is done with the help of file transfer protocol.  The use of the FTP ca be done to maintain access to the local server of the computer.

17. What anonymous FTP?

Anonymous File Transfer Protocol helps user to log in to FTP server using a common login procedure and get access to the file over the server. It also helps in downloading files for the FTP server.

 


18. How is HTTP related to WWW?

HTTP stands for Hyper Text Transfer Protocol. It is a underlying protocol that helps in defining messages in order they are formatted and transmitted over the World Wide Web. It is a file transfer protocol that helps in facilitating access to WWW.

19. What is a URL and what are its components?

URL stands for Uniform Resource Locator has been a specific type of universal resource identifier (URI). It helps in locating an existing resource from the Internet. There are four components of URL:

  • Scheme
  • Host
  • Path
  • Query string

20. What is a proxy server and how is it related to HTTP?

A proxy server can be relate with the application level gateway that helps in creating gateway between local network and large scale network including internet. It helps in providing increase in performance and security. A proxy server helps in creating a copy of responses that have been recently requested by the user. Therefore, when client has a request, cache of proxy server is required to check before request transferred to normal server.

21. What does HTML stand for and what is its function?

HTML stands for Hyper Text Markup language. HTML is used for creating webpages for displaying over web browsers.

22. What are the SNMP components?

Following are the SNMP components:

Managed devices

Agents

Network management systems

23. List the SNMP v1 and v2 message types and their function

SNMP v1 helps in providing fundamental functionalities for data polling and is relatively easy to use.

SNMP v2 helps in supporting 64-bit counters but still sends critical data as clear text, so it does not really enhance security.

24. Can two devices connected to the same Frame Relay network use the same DLCIs?

DLCIs refers to a unique interface. A switch connected to a DCLI at each virtual connection in an interface. Therefore, two several connections depending on two various interfaces might contain same DLCI.

25. Compare an SVC with a PVC

PVC” is refered to virtual circuit that is available permanently. It is a category of virtual circuit in which end points do not signal the circuit. However, “SVC” is a circuit that has been on-demand circuit maintained by user signals. “PVC” is a permanent circuit while “SVC” needs to be re-established every time when there is a need for a data transfer.

26. How is an ATM virtual connection identified?

ATM is connected by two virtual numbers including virtual path identifier (VPI) and virtual circuit identifier (VCI)

27. Why is SONET called a synchronous network?

SONET is a standard that helps in optical telecommunication transport formulated by Exchange Carriers Standards Association (ECSA). It helps in reducing the requirements of equipment’s and increase network reliability. IT also helps in synchronizing signals within digital transitions. It is a technology that helps in carrying various signals of several capacities through a synchronous channel. This can be categorized by a byte-interleaved multiplexing scheme.  IN synchronous system, SONET is able to gain average frequency of all clocks in system. Every clock need to be traced back to a highly stable reference.  A single clock is able to handle all timings of equipment and transmission across the entire network.

 

Bibliography

Bohuslava, J., Martin, J., & Igor, H. (2017, January). TCP/IP protocol utilisation in process of dynamic control of robotic cell according industry 4.0 concept. In Applied Machine Intelligence and Informatics (SAMI), 2017 IEEE 15th International Symposium on (pp. 000217-000222). IEEE.

Conti, M., & Giordano, S. (2014). Mobile ad hoc networking: milestones, challenges, and new research directions. IEEE Communications Magazine, 52(1), 85-96.

Goralski, W. (2017). The illustrated network: how TCP/IP works in a modern network. Morgan Kaufmann.

Johannisson, B. (2017). Networking and entrepreneurial growth. The Blackwell handbook of entrepreneurship, 368-386.

Kreutz, D., Ramos, F. M., Verissimo, P. E., Rothenberg, C. E., Azodolmolky, S., & Uhlig, S. (2015). Software-defined networking: A comprehensive survey. Proceedings of the IEEE, 103(1), 14-76.

Nunes, B. A. A., Mendonca, M., Nguyen, X. N., Obraczka, K., & Turletti, T. (2014). A survey of software-defined networking: Past, present, and future of programmable networks. IEEE Communications Surveys & Tutorials, 16(3), 1617-1634.

Quan, W., Xu, C., Vasilakos, A. V., Guan, J., Zhang, H., & Grieco, L. A. (2014, June). TB2F: Tree-bitmap and bloom-filter for a scalable and efficient name lookup in Content-Centric Networking. In Networking (pp. 1-9).

Shang, W., Yu, Y., Droms, R., & Zhang, L. (2016). Challenges in IoT networking via TCP/IP architecture. Technical Report NDN-0038. NDN Project.

Shojafar, M., Cordeschi, N., Abawajy, J. H., & Baccarelli, E. (2015, December). Adaptive energy-efficient qos-aware scheduling algorithm for tcp/ip mobile cloud. In Globecom Workshops (GC Wkshps), 2015 IEEE (pp. 1-6). IEEE.

Simmons, J. M. (2014). Optical network design and planning. Springer.

Vasudevan, S. K., Prakash, P., Sudhakar, P., & Srinivasan, S. (2015). A Study on Sonet and SDH with their Defects in Optical Network. Indian Journal of Science and Technology, 8(29).

Xylomenos, G., Ververidis, C. N., Siris, V. A., Fotiou, N., Tsilopoulos, C., Vasilakos, X., ... & Polyzos, G. C. (2014). A survey of information-centric networking research. IEEE Communications Surveys and Tutorials, 16(2), 1024-1049.

Yasukata, K., Honda, M., Santry, D., & Eggert, L. (2016, June). StackMap: Low-Latency Networking with the OS Stack and Dedicated NICs. In USENIX Annual Technical Conference(pp. 43-56).

Zhang, L., Afanasyev, A., Burke, J., Jacobson, V., Crowley, P., Papadopoulos, C., ... & Zhang, B. (2014). Named data networking. ACM SIGCOMM Computer Communication Review, 44(3), 66-73.

OR

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2020). Network Computing 2. Retrieved from https://myassignmenthelp.com/free-samples/g424-network-computing-2.

"Network Computing 2." My Assignment Help, 2020, https://myassignmenthelp.com/free-samples/g424-network-computing-2.

My Assignment Help (2020) Network Computing 2 [Online]. Available from: https://myassignmenthelp.com/free-samples/g424-network-computing-2
[Accessed 01 April 2020].

My Assignment Help. 'Network Computing 2' (My Assignment Help, 2020) <https://myassignmenthelp.com/free-samples/g424-network-computing-2> accessed 01 April 2020.

My Assignment Help. Network Computing 2 [Internet]. My Assignment Help. 2020 [cited 01 April 2020]. Available from: https://myassignmenthelp.com/free-samples/g424-network-computing-2.


Want to buy assignments online?. Myassignmenthelp is the right choice for getting top quality assignments on time and ridding you of the fear of failed grades. You get affordable papers from our best paper writing service. All the works are according to instructions and properly edited and proofread several times to ensure freedom from any kind of conceptual or language error. The works are delivered by the agreed upon time , at any cost. So be it homework/coursework help, research papers help, help with term papers, dissertation help, thesis help, you get it all at one place and that too of a superior quality. Join us Now.

Latest It Write Up Samples

SIT763 Cyber Security Management

Download : 0 | Pages : 5

Answer: Security Risk Assessment Security Risks, Threats and Vulnerabilities The assessment of security risks would be based on the identification, assessment and implementation of the key controls of security within the various applications used by the industry. With the carrying out of the risk assessment within the organisation, it would be beneficial for performing a risk assessment [1]. This form of risk assessment would be able to supp...

Read More arrow

HI5019 Strategic Information System And Business Report

Download : 0 | Pages : 18

Answer: Introduction: Australian Plastic Fabricators is one of the dynamic plastic fabrication company which is located in Sydney’s city fringe and is one of the Greater West supplying acrylic shop fittings to Sydney retail and shop fitting businesses. The organization is also considered to be the one stop shop for meeting all the needs related to Acrylic. Without any kind of doubt this organization can be considered to be the market le...

Read More arrow

SIT182 Real World Practices For Cybersecurity Assignment

Download : 0 | Pages : 7

Answer: Introduction The main aim of this project to develop the crack some passwords on different levels of a website. The implementing the project we can used for the ten levels that are includes are cryptography, directory traversal, sql injection, malicious redirects, Burp suites, Nmap, session management, information gathering, reporting.Postings are refreshed day by day and are utilized to spread and encourage further web hacking. Pract...

Read More arrow

ISY3001 E-Business Fundamentals And Systems Management

Download : 0 | Pages : 14
  • Course Code: ISY3001
  • University: Australian Institute Of Higher Education
  • Country: Australia

Answer: Task A: The Concept of Business-To-Business (B2B) Model In this assignment, the Business-to-Business (B2B) model of e-commerce have been chosen. The B2B model of e-commerce business can be defined as the collaboration of more than two different business organisations based on performing several forms of business transactions. This scenario also depicts the involvement of businesses based within wholesalers, retailers or different manu...

Read More arrow

COIT20249 Professional Skills In Information Communication Technology 3

Download : 0 | Pages : 10
  • Course Code: COIT20249
  • University: Central Queensland University
  • Country: Australia

Answer: Introduction Augmented Reality (AR) has emerged different technologies and it uses artificial intelligence and machine learning algorithms for providing a superimposed images and videos of real things for better understanding. In this report, AR technology will discuss with their uses in different fields as well as how it is beneficial for education system. AR is a latest technology, which is highly used for understanding of different t...

Read More arrow
Next
watch

Save Time & improve Grades

Just share your requirements and get customized solutions on time.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,238,899

Orders

4.9/5

Overall Rating

5,067

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 4/5

3076 Order Completed

99% Response Time

Emily Wei

Doctor of Philosophy (Ph.D) in Civil Engineering

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

798 Order Completed

97% Response Time

Benjamin Blakeman

MSc in Medical Technology

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1896 Order Completed

95% Response Time

Herman Berens

MSc in Psychology

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

610 Order Completed

100% Response Time

Cheryl Zhao

PhD in Statistics

Singapore, Singapore

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

I was very satisfy with that work and I think you for it because if wasn\'t for your help it would be very hard considering my writing

flag

User Id: 264099 - 31 Mar 2020

Australia

student rating student rating student rating student rating student rating

assignment was done within the promised time frame. The professor has not yet graded the assignment.

flag

User Id: 374442 - 31 Mar 2020

Australia

student rating student rating student rating student rating student rating

I was very pleased and happy with the turn over and presentation of the assignment. i will be recommending it to my family and friends

flag

User Id: 227000 - 31 Mar 2020

Australia

student rating student rating student rating student rating student rating

The assignment was good. I was pleased, it answered all questions asked although I had to complain a number of times.

flag

User Id: 382258 - 31 Mar 2020

Australia

student rating student rating student rating student rating student rating
callback request mobile
Have any Query?