Nt1310 Final Exam Paper

Improved Essays
2.3 What is Protocol?
Protocol is defined as a set of Rules which governs the communication to a network Between the Layers. In Order to establish a communication in a network Successfully, These are the Following
Example: File Transfer Protocol, Simple Mail Transfer Protocol.
2.4 What is a protocol data unit (PDU)?

Protocol Data Unit is the both the Data from Next Higher Communication layer and Total Control Information, in simple it the Combination of Bothe the Higher Layer and Information.

2.5 What is protocol architecture?

Protocol Architecture is the Structure of the Protocol which includes set of layered Protocols and functions in each and every layer and it will implement Communication Function

2.6 What is TCP/IP?
Transmission Control Protocol/Internet Protocol (TCP/IP) consists two protocols. These are designed to provide low level support for Networking Transmission. It is also used generically to refer to a more comprehensive collection of protocols. It is developed by the U.S. Department of Defense and the Internet community. 2.7 What are some advantages to layering as seen in the TCP/IP architecture? • Layering decomposes the overall communications problem into a number of more manageable sub problems. • We can easily find out the Layer Structures. • Better Transmission • The Problem can find in which layer it is occurred is simple 2.8 What is a router? Router is a Device which acts like a bridge Between Networks. Hubs and Switches are devices that are used to create networks, these are used to send Packets between those networks. Other Functions of the Routers include Network address Translation (NAT), Assigning IP address to hosts using Dynamic Host Configuration Protocol (DHCP), Broadcasting Wi-Fi Signal. 2.9 Which version of IP is the most prevalent today?
…show more content…
IPV4

2.10 Does all traffic running on the Internet use TCP?
No all the Traffic Running on the Internet will not use TCP. UDP adds no reliability, flow-control, or error-recovery functions to IP. So traffic running on the Internet More Use UDP than TCP

2.11 Compare the address space between IPv4 and IPv6. How many bits are used in Each?

In the IPV 4 the address space use 32 bits and in the IPV 6 totally 128 address bits are Used . but the IPV4 is the most Commonly used version because in the IPV4 it is relevant and faster processing and Compered to IPV 6 is less in cost . • IPv4 - 32 bits

• IPv6 - 128 bits

A. Briefly describe the following four technologies: circuit switching, packet switching, frame relay and ATM ?

1. Circuit Switching :

Circuit-switching is a network in which a physical path is obtained for and dedicated to a single connection between two end-points in the network for the duration of the connection. Voice phone service is circuit-switched Network. The telephone company reserves a specific physical path to the number you are calling for the duration of your call. During that time, no one else can use the physical lines involved. Diagram Source: Google 2. Packet Switching : Pocket switching divides messages into packets and sends each packet individually. The Internet is based on a packet-switching protocol, TCP/IP. It is the type of network in which relatively small units of data called packets are routed through a network based on the destination address contained within each packet. Breaking communication down into packets allows the same data path to be shared among many users in the network. This type of communication between sender and receiver is known as connectionless. Most traffic over the Internet uses packet switching and the Internet is basically a connectionless (wireless) network. Diagram Source: Google 3. Frame Relay : Frame Relay is a high-performance WAN protocol. This protocol operates at the physical and data link layers of the OSI reference model. Initially it was designed for use across Integrated Services Digital Network (ISDN) interfaces. Now it is used over a variety of other network interfaces as well. it is an example of a packet-switched technology. Packet-switched networks enable end stations to dynamically share the network medium and the available bandwidth. The two techniques are used in packet-switching technology • Variable-length packets: These packets are used for more efficient and flexible data transfers. These packets are switched between the various segments in the network until the destination is reached. • Statistical multiplexing: Statistical multiplexing techniques control

Related Documents

  • Decent Essays

    At this period, the first two bytes are not changed. However, the 3rd type shifts from 63 to 60 while the 4th bytes convert zero. Match with the network address in the routing table. The 2nd-row matches. The router will transmit the packet to interface 1.…

    • 607 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Figure 3 demonstrates the 3 layers that make up the SDN structure. Lowest layer represents the Infrastructure Layer or Forwarding Plane, mainly focusing on data forwarding but it also takes care of monitoring local information and gathering statistics. Next layer represents the Control Layer or Control Plane which is responsible for programming and managing the Forwarding Plane. Control Plane makes use of the information gathered by the Forwarding Plane in order to define the route and operation of the network.…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    is a software-based protocol that provides a way to locate files, devices or even individual in a network. LDAP uses port 389 and is uses by Microsoft as the main protocol that opens up this type of access. LDAP is lightweight which indicates a smaller version with a smaller code and it is part of X.500. The latter acts as a standard for network directory services. /***************************…

    • 442 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Nt1330 Unit 1 Assignment

    • 1292 Words
    • 6 Pages

    TCP/IP Transmission control Protocol/Internet protocol used to connect host computers on internet. First internet ARPANET was developed when US Department of research projects agency (ARPA) in the end of 1970s needed a system to share the resources of their big mainframe systems. In start ARPANET used Network Control Protocol but in 1974 TCP protocol was introduced and all pervious protocols were replaced with TCP Protocol. TCP/IP was the leader in protocols used as a communication protocol on the internet. TCP/IP is still being used as a communication protocol in network operating systems (Abbate, 1994).…

    • 1292 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Nt1330 Unit 6 Term Paper

    • 620 Words
    • 3 Pages

    1. Structural ex ante constrains on the agencies that prevent deviations before they occur “The most effective means for achieving policy stability are constraints on the flexibility of agencies, rather than reliance on rewards, punishments, and oversight.” Enfranchising the constituents of presidents and congress through administrative structure and process, we can constrain the bureaucrats. We should clarify each political player’s responsibility and right by regulations and laws with negotiation and bargain.…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Operational Support: An operational support system (OSS) is a group of computer programs or an IT system used by communications service providers for monitoring, controlling, analyzing and managing a computer. John Lewis do this so they can see the products they are selling well they day by their till. The till sends information to a data base that records what they are selling and what is getting returned. Data Analysis: Data analysis, is a process of inspecting, cleansing, transforming, and modeling date with the goal to discovering key information, suggesting, conclusions, and supporting decision making towards a subject.…

    • 458 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Problem Statement Communication is key, regardless of where you work. Communication can be between people or a computer communicating data to a person. When obtaining data from a computer, people want to be able to trust the data that they are receiving and that none of the packets got lost somewhere along the way. Packets are units of data that are routed between an origin and a destination on the Internet. Networks use Ethernet cables, called Category (more commonly referred to as CAT) cables to send packets to one another.…

    • 460 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    4.(a) Communication is a process of exchange message between individual or groups to understand each other. When a person wants to communicate of information, the sender encodes the message and decide which transmission channel is going to use and then send the message to receivers. After receiving a message from the sender, the receiver decode message and decides if it needs feedback, receiver response to sender of new messages. (b) There are four major communication style which is autocratic, consultative, participative, laissez-faire style.…

    • 249 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    DNP3 Protocol 3.3

    • 1257 Words
    • 6 Pages

    The OSI model is not a protocol instead, it provides a frame work for the development of other communication protocols. The bottom four layers could be classified as transport layers and top three could be classified as the high-level layers. There was a need for much simplified versions of the OSI model in the field of SCADA and IED communications. Hence a 3-layer model was created by the International Electrotechnical Commission which is called as the Enhanced Performance Architecture model or the EPA model(Clarke et al., 2004).…

    • 1257 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    TCP/IP And OSI Models

    • 957 Words
    • 4 Pages

    Which of the following answers list true facts about the network layer of TCP/IP? (Choose two answers.) a. It focuses mostly on the network between endpoints, rather than the endpoints. b. The two primary protocols are TCP and IP.…

    • 957 Words
    • 4 Pages
    Decent Essays
  • Great Essays

    Which of the following are defined by the HTTP protocol? (Choose two answers.) B. Web addresses C. Web servers 13. A PC user opens her Internet Explorer web browser, types the www.certskills.com/books web address, and presses Enter. The browser displays a new web page.…

    • 1494 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Advantage Of NAT

    • 1778 Words
    • 7 Pages

    What is NAT? As the number of computers connecting to the internet grew, we started to run out of IPv4 addresses because we start to expand so quickly. In addition, this is the reason why Network Address Translation or NAT technology was developed in order to prevent the quick reduction of IPv4 addresses. The development of NAT will allow routers, firewalls and servers running on network operating system to convert addresses between the internet (public) and private networks.…

    • 1778 Words
    • 7 Pages
    Great Essays
  • Superior Essays

    Network hardware is the physical equipment that is required to allow devices to transmit data to another device. The devices have the ability to transfer over many types of media, but there are only two basic types of transmission. We first have the broadcast transmission which transfers the same messages to multiple recipients. Then there is point-to-point links that establishes a connection between two individual 's devices for data transmission. Networks rely on these two types of transmission for everyday networking.…

    • 791 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    The Internet in the way most people recognize it was formed around the beginning of the 1990s when scientist Tim Berners-Lee developed the World Wide Web. It has changed how we shop, how we are entertained, how we receive the news and how we get information. (Thomas, 2016). The Internet moves data from one place to another very…

    • 923 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The collection of these devices is being called the “Internet of Things” (IoT) (Wasik, 2013). IPv4 simply was not meant to cover so many electronic devices connected to the Internet. IPv4 is limited to 4 billion unique Internet addresses, and IoT will push the need for IPv6, which supports 340 trillion, trillion, trillion unique Internet addresses (Carroll, 2014).…

    • 1029 Words
    • 4 Pages
    Improved Essays