Preview

Networking Lectures 1 to 4

Powerful Essays
Open Document
Open Document
1434 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Networking Lectures 1 to 4
Data Communication and Network Comps Assignment 1 Khoa Le - s3103004
Question 1.
a) Why is the transport layer not present inside the core network? Marks 3

● Core Network is the internetworking of routers. ● Transport layer deals with communication between applications. ● The transport layer is not present because it provides additional functions to the core network to compensate for the limitation of the core network layer. ○ In the case of TCP/IP protocol, the Transport Layer provide more complex services such as flow control or connection­oriented data stream transfer to increase the reliability of the data as it is sent through the network. ● By keeping these layers separate, the transport layer is able to provide a uniform networking interface where the actual topology of the underlying network can be hidden. This allows services such as flow­control, error detection/correction and connection protocols such as TCP to exist.
b) While transport layer provides reliable process­to­process message delivery and error recovery, error control is also offered in the data link layer. Suppose the transmission channels become virtually error­free. Is the data link layer still needed? Marks 3

● If the transmission channel becomes virtually error­free, the error control service in the data link layer is still needed because: ○ Data Link Layer detect errors in frames between devices within the same Local Area Network while Transport layer deals with error control and detection for application processes on the host computer. ○ Transport layer deals with packets while Data Link layer deals with frames which is a digital data transmission unit. Both layer provide error detection independent of each other. ● In terms of error control, Data Link Layer only detects corrupted frames and once found, it will be immediately discard that frame. This saves network resources by preventing known damaged frame from propagating across the network.

c) Suppose that the TCP entity



Links: ● ● ● ● ● ● http://en.kioskea.net/faq/2093­introduction­to­mtu http://sd.wareonearth.com/~phil/net/overhead/ https://learningnetwork.cisco.com/thread/31702 https://learningnetwork.cisco.com/thread/31702?start=15&tstart=0 Lecture Notes Data Computer Communications 8th ­ William Stallings

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT1210 Mid-Term Exam Study Sheet Chapter 1 1.Kilobye (KB), Megabyte(MB),Gigabyte(GB), Terabyte (TB) –Approx. number of bytes in each 2.Capacitor charge to represent 0 or1 3. Convert binary to decimal 4.Hexadecimal 5.Disk drive – platters, tracks, sectors Chapter 2 6.Digital voice calls 7.Video compression 8.Web address – identify protocol, server, web page 9.Internet core 10.Device drivers 11.Network topologies Chapter 3 12.Networking standards 13.De Facto standard 14.TCP/IP model 15.OSI model 16.Routers role in network 17.…

    • 720 Words
    • 7 Pages
    Satisfactory Essays
  • Good Essays

    Nt1210 Lab 3.1 Essay

    • 453 Words
    • 2 Pages

    At the point when information is transmitted between two separate has the OSI process must be differentiated and sent in distinctive portions. Consequently the accepting host must get these sections. The deencapsulation is the methodology differentiating the information into workable stages that the accepting host can transform in place for the application to translate it legitimately.…

    • 453 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 1 Assignment

    • 987 Words
    • 4 Pages

    Layer 4: The transport layer...This layer manages the end-to-end control (for example, determining whether all packets have arrived) and error-checking. It ensures complete data transfer.…

    • 987 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    nt1210 lab3

    • 324 Words
    • 2 Pages

    Sends frames to and from with flow control, error control and sync; also addresses topology and medias.…

    • 324 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The 5-layer model serves essentially the protocols regarded as Transmission Control Protocol (TCP) as well as Internet Protocol (IP), or mutually, TCP/IP. The User Datagram Protocol (UDP) is likewise served by this particular model. The 5-layer model was produced alongside with these protocols, anteceding the 7-layer model, and is from time to time known as the TCP Model.…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    The total number of network and subnet bits equal an address’s prefix. If a Class A address of 10.10.33.46 has a mask of 255.255.224.0, then all of the 1s in the binary form of that mask, which totals 19, would be the prefix. In CIDR notation, the address would be seen as 10.10.33.46/19.…

    • 2698 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    Networking Project Week 4

    • 1212 Words
    • 5 Pages

    One might think that a hospitals soul operations is to provide doctors and nurses to assist patients with their sickness and diseases. However, there is a ton of operations and systems that go on in the background. At Patton-Fuller Community Hospital, they split up their business information systems in four ways. Patton-Fuller Community Hospital use this system to improve communication and collaboration between senior management, employees, doctors, nurses and patients. In addition, the current system is suppose to improve the efficiency of hospital operations, relationships with current and future patients, and assist senior executives in managing hospital finances.…

    • 1212 Words
    • 5 Pages
    Better Essays
  • Good Essays

    It230 Wk1 Checkpoint

    • 576 Words
    • 3 Pages

    The third layer, network, obtains the function that serves the purpose of switching, routing, forwarding, and creating paths in order to transmit data between nodes. It also has the function and purpose to handle error(s), inter-networking, provides control in areas of congestion, and sequencing packets. Transport as the fourth layer serves as a form of a management tool of information flow between network…

    • 576 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Ex 1.4.1- 0 or just a space in between numbers. It is necessary to use a blank space because it also serves a number.…

    • 309 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Which IEEE wireless networking protocol was ratified in 2009 and has a maximum defined data rate of 600 Mb/sec?…

    • 778 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    The Session layer is equipped to request retransmission of all erroneous or missing PDUs when reassembly is underway, so that it can guarantee reliable delivery of data from sender to receiver.…

    • 694 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    4.A paradigm for electronic communications where a message is broken up into blocks of data of limited size which are then transmitted one by one across the network is called:…

    • 3425 Words
    • 14 Pages
    Good Essays
  • Good Essays

    Coding Theory Case Study

    • 1093 Words
    • 3 Pages

    The first two aspects, error detecting and error correcting can be studied together. When a digital message is transmitted, it is done so by a sequence of 0’s and 1’s which encodes a given message. These messages have the potential of being corrupted by noise. Once a message is written an error-detecting code can be written into the message so that any errors can be detected and corrected before the message reaches its final destination. One of the most common types of error- detecting code is called a parity check. A parity check is “the process that ensure accurate data transmission between nodes during communication. A parity bit is appende to the original data bits to create an even or odd bit number; the number of bits with one value. The source then transmits this data via a link, and bits are checked and verified at the destination. Data is considered accurate if the number of bits (even or odd) matches the number transmitted from the source.” (Janseen, 2014) An example could be the message 1101. We add a 0 or 1 to the end of…

    • 1093 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Networking basics

    • 519 Words
    • 3 Pages

    Describe what is meant by soft skills and explain why they are important in networking projects…

    • 519 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Communication is not just the the delivery of message from source to destination. Rather it ensures, of what is delivered is being understood in the same sense by the target. Sometimes the error occurs when the desired information is…

    • 1866 Words
    • 8 Pages
    Powerful Essays