This document discusses network models and provides answers to review questions about the layers of the Internet and OSI models. It addresses topics like the responsibilities of each layer, how information passes between layers, and differences between network addresses. Sample questions are also given about correlating layers between models and examples of functions that occur at certain layers.
This note is about the introduction of the OSI Model & TCP/IP Model. It contains details of the seven layers of the OSI Model which are Application layer, Presentation Layer, Session Layer, Transport Layer, Network Layer, Data Link Layer, Physical Layer
This note is about the introduction of the OSI Model & TCP/IP Model. It contains details of the seven layers of the OSI Model which are Application layer, Presentation Layer, Session Layer, Transport Layer, Network Layer, Data Link Layer, Physical Layer
CCN notes for &th EC students, VTU, UNIT 1 Network MOdels explanation like OSI model ,TCP/IP model and tlepohone networks and cable network for data transmission
The Open Systems Interconnection (OSI) model began as a reference model, but has since been implemented. It was created by the International Organization for Standardization (ISO) to provide a logical framework for how data communication processes should interact across networks. Standards were created for the computer industry allowing different networks to work together efficiently.ThesisScientist.com
1. Answer the following questions about OSI modela.At which layer.pdflohithkart
1. Answer the following questions about OSI model:
a.At which layer of the OSI reference model, routers operate?
b. At which level of the OSI model, bits are packaged into frames?
c. List the layers of the OSI model from top to down.
d. Mark those from the following list that operate at the presentation layer?
i.MIDI
ii.FTP
iii.SMTP
iv.TFTP
v.JPEG
e. List the two protocols at the Transport Layer.
f. What is the difference between logical and physical address? Do your research (do not copy
your answer). Which type of address is used in the network layer of the OSI model?
g. Which OSI layer implements IP?
2. Answer the following questions about Router:
a. What is a router?
b. How many types are routers are available to use? Name them.
c. Explain how a router works?
d. How many interfaces can be assigned to a router?
3. Describe the components of address classes A~E of TCP/IP addresses. Also explain
mathematically how many maximum network and hosts per network can be addressed by these
classes.
4. Answer the following questions:
a. what is the difference between IP address and MAC address?
b. What is the difference between IPv4 and IPv6? Why IPv6 was introduced? Show an example
of each and explain how they are represented mathematically.
Solution
1) a) At what level of OSI the routers operates : The routers operates at the third layer of the
model which is Network Control Layer, where a router examines the packets\' data structure and
determine whether to forward or not.
b) At which level of the OSI model, bits are packaged into frames : Bits are packaged into
frames at data link layer, which setups the links accross the physicsl network.
c) Layers of OSI model : The seven layers of OSI are Physical Layer, Data Link Layer, Network
Layer, Transport Layer, Session Layer, Presentation Layer, Application Layer.
Application Layer : At this layer communication partners are identified where we see some one
to talk to.
Presentation Layer : This is basically part of Operation System where incoming and outgoing
data are changed from one format to another.
Session Layer: This layer basically handles session and conversations/communications where
services include authentication and reconnecting service after interruption.
Transport Layer : This layer manages packetiztion of data, delievery of those packets, checking
for error.
Network Layer : This part is responsible for handling addressing and routing of packets.
Data Link Layer : This setup links between physical networks putting packets into frames.
Physical Layer : This layer communicates, conveys bit stream through network.
d) The protocols that work on transport layer are UDP(User DataGram Protocol),
TCP(Transmission Control Protocol)
e) Logical Address : In terms of memory logical address is the location where an item resides
with the perspective of executing program.
Physical Address : Its the actual address or location residing in memory which is defined in
binary form.
g) The Network Layer impleme.
CCN notes for &th EC students, VTU, UNIT 1 Network MOdels explanation like OSI model ,TCP/IP model and tlepohone networks and cable network for data transmission
The Open Systems Interconnection (OSI) model began as a reference model, but has since been implemented. It was created by the International Organization for Standardization (ISO) to provide a logical framework for how data communication processes should interact across networks. Standards were created for the computer industry allowing different networks to work together efficiently.ThesisScientist.com
1. Answer the following questions about OSI modela.At which layer.pdflohithkart
1. Answer the following questions about OSI model:
a.At which layer of the OSI reference model, routers operate?
b. At which level of the OSI model, bits are packaged into frames?
c. List the layers of the OSI model from top to down.
d. Mark those from the following list that operate at the presentation layer?
i.MIDI
ii.FTP
iii.SMTP
iv.TFTP
v.JPEG
e. List the two protocols at the Transport Layer.
f. What is the difference between logical and physical address? Do your research (do not copy
your answer). Which type of address is used in the network layer of the OSI model?
g. Which OSI layer implements IP?
2. Answer the following questions about Router:
a. What is a router?
b. How many types are routers are available to use? Name them.
c. Explain how a router works?
d. How many interfaces can be assigned to a router?
3. Describe the components of address classes A~E of TCP/IP addresses. Also explain
mathematically how many maximum network and hosts per network can be addressed by these
classes.
4. Answer the following questions:
a. what is the difference between IP address and MAC address?
b. What is the difference between IPv4 and IPv6? Why IPv6 was introduced? Show an example
of each and explain how they are represented mathematically.
Solution
1) a) At what level of OSI the routers operates : The routers operates at the third layer of the
model which is Network Control Layer, where a router examines the packets\' data structure and
determine whether to forward or not.
b) At which level of the OSI model, bits are packaged into frames : Bits are packaged into
frames at data link layer, which setups the links accross the physicsl network.
c) Layers of OSI model : The seven layers of OSI are Physical Layer, Data Link Layer, Network
Layer, Transport Layer, Session Layer, Presentation Layer, Application Layer.
Application Layer : At this layer communication partners are identified where we see some one
to talk to.
Presentation Layer : This is basically part of Operation System where incoming and outgoing
data are changed from one format to another.
Session Layer: This layer basically handles session and conversations/communications where
services include authentication and reconnecting service after interruption.
Transport Layer : This layer manages packetiztion of data, delievery of those packets, checking
for error.
Network Layer : This part is responsible for handling addressing and routing of packets.
Data Link Layer : This setup links between physical networks putting packets into frames.
Physical Layer : This layer communicates, conveys bit stream through network.
d) The protocols that work on transport layer are UDP(User DataGram Protocol),
TCP(Transmission Control Protocol)
e) Logical Address : In terms of memory logical address is the location where an item resides
with the perspective of executing program.
Physical Address : Its the actual address or location residing in memory which is defined in
binary form.
g) The Network Layer impleme.
Similar to 300192190-Chapter-2-Network-Models-Exercise-Question-With-Solution.pdf (20)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
1. 1 | P a g e M D . S a i d u r R a h m a n K o h i n o o R
www.facebook.com/kohinoor11
CHAPTER 2
Network Models
Review Questions
1. List the layers of the Internet model.
Ans: The layers of TCP or Internet model are:
i. Physical layer
ii. Data link layer
iii. Network layer
iv. Transport layer and
v. Application layer.
2. Which layers in the Internet model are the network support layers?
Ans: Physical, data link, and network layers.
3. Which layer in the Internet model is the user support layer?
Ans: In the Internet Model only Application layer supports the user.
4. What is the difference between network layer delivery and transport layer delivery?
Ans: The transport layer is responsible for process-to-process delivery of the entire message, but
the network layer oversees host-to-host delivery of individual packets.
5. What is a peer-to-peer process?
Ans: Peer-to-peer processes are processes on two or more devices communicating at a same
layer
6. How does information get passed from one layer to the next in the Internet model?
Ans: Each layer calls upon, the services of the layer just below it using interfaces between each
pair of adjacent layers.
7. What are headers and trailers, and how do they get added and removed?
Ans: Headers and trailers are control data added at the beginning and the end of each data unit at
each layer of the sender and removed at the corresponding layers of the receiver. They provide
source and destination addresses, synchronization points, information for error detection etc.
8. What are the concerns of the physical layer in the Internet model?
Ans: The physical layer is responsible for transmitting bits. Also it is concerned with
a. physical topology
b. representation of bits
c. type of encoding
d. synchronization of bits
e. transmission rate and mode
f. Line Configuration
9. What are the responsibilities of the data link layer in the Internet model?
2. 2 | P a g e M D . S a i d u r R a h m a n K o h i n o o R
www.facebook.com/kohinoor11
Ans: The data link layer is responsible for
a. Framing data bits
b. Physical addressing
c. Data rate means flow control
d. Error Control
d. Access Control
10. What are the responsibilities of the network layer in the Internet model?
Ans: The network layer is responsible for transmitting of a packet across multiple networks;
therefore its responsibilities include
a. Logical addressing
b. Routing
11. What are the responsibilities of the transport layer in the Internet model?
Ans: The transport layer oversees the process-to-process delivery of the entire message. It is
responsible for
a. Segmentation and reassembly
b. Connection Control
c. Flow control
d. Error control
12. What is the difference between a port address, a logical address, and a physical address?
Ans: The physical address is the local address of a node; it is used by the data link layer to
deliver data from one node to another within the same network. The logical address defines the
sender and receiver at the network layer and is used to deliver messages across multiple
networks. The port address (service-point) identifies the application process on the station.
13. Name some services provided by the application layer in the Internet model.
Ans: The application layer services include file transfer, remote access, shared database
management, and mail services. Also responsible for dialog control, synchronization, (concern
session layer in OSI model) translation, encryption and compression. (concern presentation layer
in OSI model)
14. How do the layers of the Internet model correlate to the layers of the OSI model?
Ans: The application, presentation, and session layers of the OSI model are represented by the
application layer in the Internet model. The lowest four layers of OSI correspond to the Internet
model layers.
Exercises
15. How are OSI and ISO related to each other?
Ans: The International Standards Organization, or the International Organization of Standards,
(ISO) is a multinational body dedicated to worldwide agreement on international standards. An
ISO standard that covers all aspects of network communications is the Open Systems
Interconnection (OSI) model.
3. 3 | P a g e M D . S a i d u r R a h m a n K o h i n o o R
www.facebook.com/kohinoor11
16. Match the following to one or more layers of the OSI model:
a. Route determination
b. Flow control
c. Interface to transmission media
d. Provides access for the end use
Ans:
a. Route determination: network layer
b. Flow control: data link and transport layers
c. Interface to transmission media: physical layer
d. Access for the end user: application layer
17. Match the following to one or more layers of the OSI model:
a. Reliable process-to-process message delivery
b. Route selection
c. Defines frames
d. Provides user services such as email and file transfer
e. Transmission of bit stream across physical medium
Ans:
a. Reliable process-to-process delivery: transport layer
b. Route selection: network layer
c. Defining frames: data link layer
d. Providing user services: application layer
e. Transmission of bits across the medium: physical layer.
18. Match the following to one or more layers of the OSl model:
a. Communicates directly with user's application program
b. Error correction and retransmission
c. Mechanical, electrical, and functional interface
d. Responsibility for carrying frames between adjacent nodes
Ans:
a. Communication with user’s application program: application layer
b. Error correction and retransmission: data link and transport layers
c. Mechanical, electrical, and functional interface: physical layer
d. Responsibility for carrying frames between adjacent nodes: data link layer
19. Match the following to one or more layers of the OSI model:
a. Format and code conversion services
b. Establishes, manages, and terminates sessions
c. Ensures reliable transmission of data
d. Log-in and log-out procedures
e. Provides independence from differences in data representation
Ans:
a. Format and code conversion services: presentation layer
b. Establishing, managing, and terminating sessions: session layer
c. Ensuring reliable transmission of data: data link and transport layers
4. 4 | P a g e M D . S a i d u r R a h m a n K o h i n o o R
www.facebook.com/kohinoor11
d. Log-in and log-out procedures: session layer
e. Providing independence from different data representation: presentation layer.
20. In Figure 2.22, computer A sends a message to computer D via LANl, router Rl, and LAN2.
Show the contents of the packets and frames at the network and data link layer for each hop
interface.
Ans:
21. In Figure 2.22,(given avobe) assume that the communication is between a process running at
computer A with port address i and a process running at computer D with port address j. Show
the contents of packets and frames at the network, data link, and transport layer for each hop.
Ans:
5. 5 | P a g e M D . S a i d u r R a h m a n K o h i n o o R
www.facebook.com/kohinoor11
22. Suppose a computer sends a frame to another computer on a bus topology LAN. The physical
destination address of the frame is corrupted during the transmission. What happens to the
frame? How can the sender be informed about the situation?
Ans: If the corrupted destination address does not match any station address in the network, the
packet is lost. If the corrupted destination address matches one of the stations, the frame is
delivered to the wrong station. In this case, however, the error detection mechanism, available in
most data link protocols, will find the error and discard the frame.
23. Suppose a computer sends a packet at the network layer to another computer somewhere in
the Internet. The logical destination address of the packet is corrupted. What happens to the
packet? How can the source computer be informed of the situation?
Ans: Before using the destination address in an intermediate or the destination node, the packet
goes through error checking that may help the node find the corruption (with a high probability)
and discard the packet. Normally the upper layer protocol will inform the source to resend the
packet.
24. Suppose a computer sends a packet at the transport layer to another computer somewhere in
the Internet. There is no process with the destination port address running at the destination
computer. What will happen?
Ans: Most protocols issue a special error message that is sent back to the source in this case.
25. If the data link layer can detect errors between hops, why do you think we need another
checking mechanism at the transport layer?
Ans: The errors between the nodes can be detected by the data link layer control, but the error at
the node (between input port and output port) of the node cannot be detected by the data link
layer.