Preview

Internet Technology

Powerful Essays
Open Document
Open Document
1195 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Internet Technology
ECTE182 – Internet Technology 1 – Tutorial Questions – Network Layer

Week 10 Tutorial Questions – Solutions Chapter 20 ed 4: Network Layer (Internet Protocol) Solutions – ECTE182 – Internet Technology 1 - Spring Session 2007/2012 Review Questions
1- What is the difference between the delivery of a frame in the data link layer and the delivery of a packet in the network layer? The delivery of a frame in the data link layer is node-to-node. The delivery of a packet at the network layer is host-to-host.

2- What is the difference between connectionless and connection-oriented services? Which type of the service is provided by IPv4? Which type of the service is provided by IPv6? Communication at the network layer in the Internet is connectionless. Why?     In a connectionless service, there are no setup and teardown phases. Each packet is independent from every other packet. Communication has only one phase: data transfer. In connection-oriented service, a virtual connection is established between the sender and the receiver before transferring data. Communication has three phases: setup, data transfer, and teardown. IPv4 provides a connectionless service; IPv6 normally provides a connectionless service, but it can provide a connectionoriented service if flow label field is used.

3- Define fragmentation and explain why the IPv4 and IPv6 protocols need to fragment some packets. Is there any difference between two protocols in this matter? Each data link layer protocol has a limit on the size of the packet it can carry. When a datagram is encapsulated in a frame, the total size of the datagram must be less than this limit. Otherwise, the datagram must be fragmented. IPv4 allows fragmentation at the host and any router; IPv6 allows fragmentation only at the host.

School of Electrical, Computer and Telecommunication Engineering – P Doulai/P Vial - Spring Session 2007/12

1

ECTE182 – Internet Technology 1 – Tutorial Questions – Network Layer

4-

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The reason for picking answer A and D is because they are the only that makes sense. The purpose of the transport layer takes a large amount of packet or data and sends it on the network and break it into smaller pieces on the source host. Then, the network layer take the same data or packet and reassemble them for the destination host on the network.…

    • 247 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    NT1210Unit3Lab3

    • 1288 Words
    • 4 Pages

    Exercise 3.3.3 The most common protocols used from this suite are IP, TCP, and UDP. Briefly describe the purpose and functions of each of these.…

    • 1288 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Nt1210 Lab 3.1 Essay

    • 453 Words
    • 2 Pages

    At the point when information is transmitted between two separate has the OSI process must be differentiated and sent in distinctive portions. Consequently the accepting host must get these sections. The deencapsulation is the methodology differentiating the information into workable stages that the accepting host can transform in place for the application to translate it legitimately.…

    • 453 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    IEEE802 standard series protocol, the data link layer includes a logical link control (LLC) sublayer and the media access control (MAC) sub-layer which is located between the MAC layer and the physical LLC, which allows adaptation to different LLC media access technology and physical media. MAC sublayer as a separate, they will not change the impact of the media access method and higher level protocols. MAC disassembly of data and media access management of two modules, the completion of the data frame encapsulation, re-opened send and receive functions. Ethernet frame encapsulation format as shown in Table 1, where the destination address, source address, length / type field and the data generated by the four layer protocol module when transmitting data frames, data encapsulation module automatically adding data to be transmitted in the first seven bytes of preamble and a delimiter byte and add at the end of the data transfer byte sent four cyclic redundancy check code, if the data length is less than 46 bytes , the data is automatically filled in order to achieve the minimum length required when receiving data frame, the data will be automatically discarded removable module preamble and delimiter two fields.…

    • 312 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    IS3220 Final Exam

    • 700 Words
    • 4 Pages

    4. Which of the following protocols is a connection-oriented protocol that operates at the transport layer of the OSI model and supports reliable connections?…

    • 700 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    4. The data link layer strips the data-link header and trailer, and then passes the remaining data up to the network layer.…

    • 648 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    nt1210 unit 1 lab1

    • 1325 Words
    • 5 Pages

    Answer: C. The physical layer sits just below the data link layer. D. The physical layer sits just below the data link layer.…

    • 1325 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    IS3220

    • 1161 Words
    • 8 Pages

    4. Which of the following protocols is a connection-oriented protocol that operates at the transport layer of the OSI model and supports reliable connections?…

    • 1161 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    TCP / IP Model - provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination. This functionality has been organized into four abstraction layers which are used to sort all related protocols according to the scope of networking involved.[1][2] From lowest to highest, the layers are the link layer, containing communication technologies for a single network segment (link), the internet layer, connecting hosts across independent networks, thus establishing internetworking.…

    • 559 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    NT1210 Final Exam Notes

    • 1243 Words
    • 5 Pages

    Essentially, link refers to any cable between two devices, and node refers to any device.…

    • 1243 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    It230 Wk1 Checkpoint

    • 576 Words
    • 3 Pages

    The first layer, physical, obtains a function that has the purpose of sending or receiving data by way of signals or voltages through physical aspects such as, cables or cards. With such data, signals, voltages, physical aspects of cables and cards, it is what is utilized in network connecting. The second layer, data-link, consists of encoded, decoded bits of data packets, which consists also of a management, knowledge transmission-protocol that works in connection with two additional internal layers, “media access control (MAC) layer and the logical link control (LLC) layer”, (2006. PP.S3). Both additional layers serve a function and purpose that determines how data is accessed from a network computer, gives it the data transmit permission, and controls in relation to checking for error(s), controls flow, and synchronization of the frame.…

    • 576 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Cis532 Assignment

    • 3352 Words
    • 14 Pages

    In 1970 the head of the Network Working Group, Steve Crocker and his team finished modifying original ARPANET host-to-host protocol and named it NCP (Network Control Protocol). This was possible because of IMP (Interface Message Processor) creation by Bob Kahn. IPM enabled computers to interact with other computers from other packet-switched networks (known today as a LAN – Local Area Network).…

    • 3352 Words
    • 14 Pages
    Satisfactory Essays
  • Good Essays

    chapter 1.1 review

    • 368 Words
    • 2 Pages

    6). What is the process of dividing a large TCP/IP address space into multiple smaller network is called? C. Subnetting…

    • 368 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Using the five layer Internet model - A message transmitted from one computer to another would start in the application layer where letters, numbers, and keystrokes of the message are converted into HTTP packet. The message would then be send through the transport layer, which would establish, maintain, and terminate the connection between the computers for…

    • 721 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Osi Layers

    • 353 Words
    • 2 Pages

    b. Protocols in the Transport layer accept data from the Session layer and manage end-to-end delivery of data.…

    • 353 Words
    • 2 Pages
    Satisfactory Essays