The transport layer is a conceptual

Verified

Added on  2022/09/05

|8
|1662
|18
AI Summary

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
NETWORKING 0
Assessment No-
Assessment Title-
Student Name & ID-
Subject Name and Code-
Student Email Address-
TCP/IP Networking

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
NETWORKING 1
Table of Contents
Question 1...................................................................................................................................................2
Link-layer frame.......................................................................................................................................2
Network later datagram..........................................................................................................................2
Transport layer segment.........................................................................................................................2
Application layer message.......................................................................................................................2
Question 2...................................................................................................................................................2
Question 3...................................................................................................................................................3
Question 4...................................................................................................................................................5
References...................................................................................................................................................7
Document Page
NETWORKING 2
Question 1
Link-layer frame
The term link layer frame is a unit of communication in the data link that takes the
data packets from the network layer and summarizes them into numerous frames. If the
size of the frame is larger than the packet may be categorized into small frames. A data link
layer frame contains numerous sections including frame header, payload field, trailer, and
flag. All these sections help to transfer data packets from one source to another (Asim,
2017).
Network later datagram
The term datagram is a transfer unit linked to the packet-switched networks which
are mainly structured in the payload and header sections. Using network later datagram,
consumers can perform data transmission operations across a packet-switched network
(Zhang, et al., 2016).
Transport layer segment
The transport layer is a conceptual division of techniques in the network protocols
that deliver connection-oriented programs to the consumers. In the case of the transport
layer segment, the statistical multiplexing technique is used for forming data segments and
including source and destination ports in the systems (Salman, & Jain, 2015).
Application layer message
It is found that an application layer is an effective part of the communication
protocol that helps to transfer message signals from one network to another via internet
servers (Suherman, Mubarakah, & AL-AKAIDI, 2015). Numerous kinds of protocols are
used in the application layer message including HTTP, FTP, and SMTP that are capable to
send data over numerous communication systems.
Document Page
NETWORKING 3
Question 2
It is reported that the application developers do not require his application to
utilization congestion control in the TCP protocol because congestion control may throttle
the data transferring rate in the applications at the time of congestion. Therefore, the
application developed may include reliable data transfer into the application layer
networks that need effective work and debugging process (Zaidi, Bitam, & Mellouk, 2017).
For ensuring reliability and effectiveness of data transmission, the developers require
including the application layer to the Ack functions for supporting data segments and
include proper sequencing which can help to manage data in an effective manner.
Therefore, it is reported that the provided statement is true where developers can add a
reliable data transmission process to the UDP protocols.
Question 3
Consider 3 subnet systems that contain the prefix address 223.1.17/24. In which
223.1.17/24 shows that from the chosen 32-bits of internet protocols only 24 bits are
assigned as 223.1.17. So, it is reported that subnets have IP addresses in the form of
223.1.17.XXXX/Y in which XXXX represents the decimal value of the last four-bit signals
and Y represents the total bits used in the initial section of the address. It is found that
subnet 1 contains a minimum of 60 interfaces that means 6 bits may support up to 64
addresses in the systems (Matotek, Turnbull, & Lieverdink, 2017). Moreover, subnet 2
contains a minimum of 90 interfaces that mean 7-bit signals can support a maximum of 128
addresses and subnet 3 contains a minimum of 12 interfaces for which total 4-bit signals
may support a maximum of 16 addresses.
For Subnet 1:
It has minimum 60 interfaces that means 6 bits may support up to 64 addresses in
the systems. So, the host addresses range from 128 to 191 bits which can be represented
as:
10000000 to 10111111

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
NETWORKING 4
Moreover, from 32 bits around 6 bits are used in the system for which the prefix
range is given as:
Prefix range= 32-6= 26.
So, subnet 1 includes 64-bit addresses including:
223.1.17.128/26 to 223.1.17.191/26
For subnet 2
It contains a minimum of 90 interfaces that mean 7-bit signals can support a
maximum of 128 addresses. So, the host addresses range from 0 to 127 bits which can be
represented as:
00000000 to 01111111
Moreover, from 128 bits around 7 bits are used in the system for which the prefix
range is given as:
Prefix range= 32-5= 27.
So, subnet 2 includes 128-bit addresses including
223.1.17.0/25 to 223.1.17.127/25
For subnet 3
It contains a minimum of 12 interfaces for which total 4-bit signals may support a
maximum of 16 addresses. So, the host addresses range from 192 to 207 bits which can be
represented as:
11000000 to 11001111
Moreover, from 32 bits around 5 bits are used in the system for which the prefix
range is given as:
Prefix range= 32-4= 28.
Document Page
NETWORKING 5
So, subnet 3 includes 16-bit addresses including
223.1.17.192/28 to 223.1.17.207/28
Question 4
From the provided scenario, it is found that the computer first utilizes DHCP
protocol which is a network handling process utilized in the IP networks. In which a DHCP
protocol is assigned to the IP address and other networks are configured with the IP
networks for gathering IP addresses. It is determined that the computer system initially
makes a singular IP datagram intended to 255.255.255.255 in the DHCP network protocol
and places it in an Ethernet edge. After that using the concept of DHCP protocol, the user's
computer will be capable to gather an IP address with the provided lease period (Mubarok,
2014). As ARP cache of the computer system is originally unfilled, the computer system will
utilize ARP procedure for obtaining the MAC addresses of the initial router and the native
DNS network.
The computing system initially obtains the IP discourse of the Web page (ITC 542)
consumers would like to transfer data from one server to another. If the native DNS system
does contain IP addresses, then the computing device will utilize the DNS server for
determining the appropriate IP address. Once computing systems of users obtain the IP
address of the Web server (ITC 542) then it will be transferred to the HTTP network using
the concept of the first-hop router if the webserver (ITC 542) does not exist in in the native
Web system (ITC 542).
The HTTP appeal signal will be evaluated and summarized into TCP data packets, and
condensed into IP packets (Zhu, et al., 2015). After that, the signals will be compressed into
Ethernet edges. It is found that the computing device will transfer the Ethernet edges
envisioned to the router. Once the computing router obtains the edges, it transfers them to
the internet protocol layer for evaluating and analyzing its routing bench, and then transfer
the data packets to the correct boundary. After this process, the IP packets will be
evaluated using internet servers until they reach to the web page. The below-highlighted
steps are used for configuring the servers with systems:
Document Page
NETWORKING 6
The computing device makes an IP datagram which is represented as
255.255.255.255 for transferring data to the destination.
This datagram is placed in the Ethernet frame
Internet protocol packets are transferred to the first-hop router
Router transfer such internet protocol packets to the consumers

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
NETWORKING 7
References
Asim, M. (2017). A survey on application layer protocols for the Internet of Things
(IoT). International Journal of Advanced Research in Computer Science, 8(3), 6-10.
Matotek, D., Turnbull, J., & Lieverdink, P. (2017). Infrastructure Services: NTP, DNS, DHCP,
and SSH. In Pro Linux System Administration, 12(6), 417-471.
Mubarok, A. (2014). Perancangan Jaringan Dengan Router Pc Dan Vlsm (Variable Less
Subnet Masking): Studi Kasus Di Universitas Bsi Bandung. Jurnal Informatika, 1(2),
2-6.
Salman, T., & Jain, R. (2015). Networking protocols and standards for the internet of
things. Internet of Things and Data Analytics Handbook, 2015, 12(6), 215-238.
Suherman, A. A. M., Mubarakah, N., & AL-AKAIDI, M. (2015). A Transport Layer Protocol for
uplink WiMAX video streaming. International Journal of Multimedia & Ubiquitous
Engineering, 10(1), 12-18.
Zaidi, S., Bitam, S., & Mellouk, A. (2017). Enhanced user datagram protocol for video
streaming in VANET. In 2017 IEEE International Conference on Communications
(ICC), 12(6), 1-6.
Zhang, M., Mezzavilla, M., Ford, R., Rangan, S., Panwar, S., Mellios, E., ... & Zorzi, M. (2016).
Transport layer performance in 5G mmWave cellular. In 2016 IEEE Conference on
Computer Communications Workshops (INFOCOM WKSHPS), 12(6), 730-735.
Zhu, L., Hu, Z., Heidemann, J., Wessels, D., Mankin, A., & Somaiya, N. (2015). Connection-
oriented DNS to improve privacy and security. In 2015 IEEE symposium on security
and privacy, 12(6), 171-186.
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]