SlideShare a Scribd company logo
1 of 1
Download to read offline
1) What layers in the protocol stack(both logically and physically) does the HTTP protocol talk
to?
2) What might a protocol frame from a Web Browser session look like as it goes out of a
network port? Assume the link layer is ethernet. You do not need to describe the fields inside a
particular header except to say it is a particular protocol header (ie TCP header).
3) I can change a link layer protocol and the application layer protocol does not need to know or
be made aware of the change. Explain why?
Solution
A protocol stack is a complete set of network protocol layers that work together to provide
networking capabilities. It is called a stack because it is typically designed as a hierarchy of
layers, each supporting the one above it and using those below it.
A protocol is a mutually agreed-upon format for doing something. With regard to computers, it
most commonly refers a set of rules (i.e., a standard) that enables computers to connect and
transmit data to one another; this is also called a communications protocol. A protocol can be
implemented by hardware, software, or a combination of the two.
Individual protocols are typically designed with a single purpose in mind. This modularization,
which is consistent with the Unix philosophy, facilitates both design and evaluation. The use of a
layered approach facilitates allowing different protocols to be substituted for each other, for
example, to accommodate new protocols and different network architectures.
The number of layers varies according to the particular protocol stack. For example, TCP/IP
(transmission control protocol/Internet protocol), which defines communication over the Internet
and most other computer networks, has five layers (application, transport, network, data link and
physical). The also widely used OSI (open systems interconnect) reference model, defines seven
layers (application, presentation, session, transport, network, data link and physical).
Regardless of the number of layers, the lowest protocols always deal with low-level, physical
interaction of the hardware. Each higher layer adds additional features, and user applications
typically interact only with the uppermost layers. The layers can be broadly classified into media,
transport and application
The terms protocol stack and protocol suite are often used interchangeably. However, the two are
sometimes used with subtle differences, such as the former being a complete set of protocols and
the latter being a subset of them, often supplied by a particular vendor, or the latter being the
definition of the protocols and the former being the software implementation of them.

More Related Content

Similar to 1) What layers in the protocol stack(both logically and physically) .pdf

Unit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdfUnit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdf
Arumugam90
 
MK-PPT Chapter 1.ppt computer networks foundation
MK-PPT Chapter 1.ppt computer networks foundationMK-PPT Chapter 1.ppt computer networks foundation
MK-PPT Chapter 1.ppt computer networks foundation
AliMarhoon18
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networking
isma ishak
 
Network essentials chapter 2
Network essentials  chapter 2Network essentials  chapter 2
Network essentials chapter 2
Raghu nath
 

Similar to 1) What layers in the protocol stack(both logically and physically) .pdf (20)

Introduction to TCP / IP model
Introduction to TCP / IP modelIntroduction to TCP / IP model
Introduction to TCP / IP model
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi Model
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Tcp/Ip Model
Tcp/Ip ModelTcp/Ip Model
Tcp/Ip Model
 
OsiI model
OsiI modelOsiI model
OsiI model
 
Wp simoneau osi_model
Wp simoneau osi_modelWp simoneau osi_model
Wp simoneau osi_model
 
Osi model
Osi modelOsi model
Osi model
 
Practical Wireless, Ethernet and TCP/IP Networking
Practical Wireless, Ethernet and TCP/IP NetworkingPractical Wireless, Ethernet and TCP/IP Networking
Practical Wireless, Ethernet and TCP/IP Networking
 
Unit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdfUnit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdf
 
MK-PPT Chapter 1.ppt computer networks foundation
MK-PPT Chapter 1.ppt computer networks foundationMK-PPT Chapter 1.ppt computer networks foundation
MK-PPT Chapter 1.ppt computer networks foundation
 
CCNA Report
CCNA ReportCCNA Report
CCNA Report
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
 
Network Fundamentals: OSI Model
Network Fundamentals: OSI Model Network Fundamentals: OSI Model
Network Fundamentals: OSI Model
 
Advances in computer networks, computer architecture
Advances in computer networks, computer architectureAdvances in computer networks, computer architecture
Advances in computer networks, computer architecture
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networking
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Network essentials chapter 2
Network essentials  chapter 2Network essentials  chapter 2
Network essentials chapter 2
 
Avani
AvaniAvani
Avani
 
Ccna notes
Ccna notesCcna notes
Ccna notes
 

More from mcmillenfawbushrom13

Using replication, you can distribute data to different locations an.pdf
Using replication, you can distribute data to different locations an.pdfUsing replication, you can distribute data to different locations an.pdf
Using replication, you can distribute data to different locations an.pdf
mcmillenfawbushrom13
 
Isotope analysis of water can be used to detect climate change. Expl.pdf
Isotope analysis of water can be used to detect climate change.  Expl.pdfIsotope analysis of water can be used to detect climate change.  Expl.pdf
Isotope analysis of water can be used to detect climate change. Expl.pdf
mcmillenfawbushrom13
 
Freud believed that are the most crucial for personality development.pdf
Freud believed that are the most crucial for personality development.pdfFreud believed that are the most crucial for personality development.pdf
Freud believed that are the most crucial for personality development.pdf
mcmillenfawbushrom13
 

More from mcmillenfawbushrom13 (20)

Why does over heat-fixation distort cells Why is it important not.pdf
Why does over heat-fixation distort cells Why is it important not.pdfWhy does over heat-fixation distort cells Why is it important not.pdf
Why does over heat-fixation distort cells Why is it important not.pdf
 
Which of the following organs belong(s) to more than one organ system.pdf
Which of the following organs belong(s) to more than one organ system.pdfWhich of the following organs belong(s) to more than one organ system.pdf
Which of the following organs belong(s) to more than one organ system.pdf
 
Using replication, you can distribute data to different locations an.pdf
Using replication, you can distribute data to different locations an.pdfUsing replication, you can distribute data to different locations an.pdf
Using replication, you can distribute data to different locations an.pdf
 
Answer the following questions pleaseSolutionAnswer to questio.pdf
Answer the following questions pleaseSolutionAnswer to questio.pdfAnswer the following questions pleaseSolutionAnswer to questio.pdf
Answer the following questions pleaseSolutionAnswer to questio.pdf
 
Use the following function fragment to identify the data type that r.pdf
Use the following function fragment to identify the data type that r.pdfUse the following function fragment to identify the data type that r.pdf
Use the following function fragment to identify the data type that r.pdf
 
Translate the following sentence into first-order logic. John is the.pdf
Translate the following sentence into first-order logic.  John is the.pdfTranslate the following sentence into first-order logic.  John is the.pdf
Translate the following sentence into first-order logic. John is the.pdf
 
There are several types of fluid-filled spaces with the brain. Read t.pdf
There are several types of fluid-filled spaces with the brain. Read t.pdfThere are several types of fluid-filled spaces with the brain. Read t.pdf
There are several types of fluid-filled spaces with the brain. Read t.pdf
 
The picture above shows the life cycle of a moss. Finish the followi.pdf
The picture above shows the life cycle of a moss. Finish the followi.pdfThe picture above shows the life cycle of a moss. Finish the followi.pdf
The picture above shows the life cycle of a moss. Finish the followi.pdf
 
The breakeven point is the level at which total contributionA equa.pdf
The breakeven point is the level at which total contributionA equa.pdfThe breakeven point is the level at which total contributionA equa.pdf
The breakeven point is the level at which total contributionA equa.pdf
 
Some DRM systems have been implemented on open systems and some have.pdf
Some DRM systems have been implemented on open systems and some have.pdfSome DRM systems have been implemented on open systems and some have.pdf
Some DRM systems have been implemented on open systems and some have.pdf
 
Quiz Chapter 02 Graded Quiz 2 pts 2. in the accounting department, s.pdf
Quiz Chapter 02 Graded Quiz 2 pts 2. in the accounting department, s.pdfQuiz Chapter 02 Graded Quiz 2 pts 2. in the accounting department, s.pdf
Quiz Chapter 02 Graded Quiz 2 pts 2. in the accounting department, s.pdf
 
PythonPrompt a user to enter a password. Encrypt the password the .pdf
PythonPrompt a user to enter a password. Encrypt the password the .pdfPythonPrompt a user to enter a password. Encrypt the password the .pdf
PythonPrompt a user to enter a password. Encrypt the password the .pdf
 
Material Sciencr question 5 State the three things required for galv.pdf
Material Sciencr question 5 State the three things required for galv.pdfMaterial Sciencr question 5 State the three things required for galv.pdf
Material Sciencr question 5 State the three things required for galv.pdf
 
Many corals have photosynthesizing organisms that live within their .pdf
Many corals have photosynthesizing organisms that live within their .pdfMany corals have photosynthesizing organisms that live within their .pdf
Many corals have photosynthesizing organisms that live within their .pdf
 
Isotope analysis of water can be used to detect climate change. Expl.pdf
Isotope analysis of water can be used to detect climate change.  Expl.pdfIsotope analysis of water can be used to detect climate change.  Expl.pdf
Isotope analysis of water can be used to detect climate change. Expl.pdf
 
Indicate if the objectregion listed below is made of plasma. Provid.pdf
Indicate if the objectregion listed below is made of plasma. Provid.pdfIndicate if the objectregion listed below is made of plasma. Provid.pdf
Indicate if the objectregion listed below is made of plasma. Provid.pdf
 
Indicate whether each factor on the left would increase or decrease u.pdf
Indicate whether each factor on the left would increase or decrease u.pdfIndicate whether each factor on the left would increase or decrease u.pdf
Indicate whether each factor on the left would increase or decrease u.pdf
 
how does a unicellular spore get to be the gametophyte generation.pdf
how does a unicellular spore get to be the gametophyte generation.pdfhow does a unicellular spore get to be the gametophyte generation.pdf
how does a unicellular spore get to be the gametophyte generation.pdf
 
Freud believed that are the most crucial for personality development.pdf
Freud believed that are the most crucial for personality development.pdfFreud believed that are the most crucial for personality development.pdf
Freud believed that are the most crucial for personality development.pdf
 
Every Pole has a (Pole). Every Zero has a (Zero). Why are their co.pdf
Every Pole has a (Pole). Every Zero has a (Zero). Why are their co.pdfEvery Pole has a (Pole). Every Zero has a (Zero). Why are their co.pdf
Every Pole has a (Pole). Every Zero has a (Zero). Why are their co.pdf
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Recently uploaded (20)

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 

1) What layers in the protocol stack(both logically and physically) .pdf

  • 1. 1) What layers in the protocol stack(both logically and physically) does the HTTP protocol talk to? 2) What might a protocol frame from a Web Browser session look like as it goes out of a network port? Assume the link layer is ethernet. You do not need to describe the fields inside a particular header except to say it is a particular protocol header (ie TCP header). 3) I can change a link layer protocol and the application layer protocol does not need to know or be made aware of the change. Explain why? Solution A protocol stack is a complete set of network protocol layers that work together to provide networking capabilities. It is called a stack because it is typically designed as a hierarchy of layers, each supporting the one above it and using those below it. A protocol is a mutually agreed-upon format for doing something. With regard to computers, it most commonly refers a set of rules (i.e., a standard) that enables computers to connect and transmit data to one another; this is also called a communications protocol. A protocol can be implemented by hardware, software, or a combination of the two. Individual protocols are typically designed with a single purpose in mind. This modularization, which is consistent with the Unix philosophy, facilitates both design and evaluation. The use of a layered approach facilitates allowing different protocols to be substituted for each other, for example, to accommodate new protocols and different network architectures. The number of layers varies according to the particular protocol stack. For example, TCP/IP (transmission control protocol/Internet protocol), which defines communication over the Internet and most other computer networks, has five layers (application, transport, network, data link and physical). The also widely used OSI (open systems interconnect) reference model, defines seven layers (application, presentation, session, transport, network, data link and physical). Regardless of the number of layers, the lowest protocols always deal with low-level, physical interaction of the hardware. Each higher layer adds additional features, and user applications typically interact only with the uppermost layers. The layers can be broadly classified into media, transport and application The terms protocol stack and protocol suite are often used interchangeably. However, the two are sometimes used with subtle differences, such as the former being a complete set of protocols and the latter being a subset of them, often supplied by a particular vendor, or the latter being the definition of the protocols and the former being the software implementation of them.